Script used to analyze the sosreport file (focus on Satellite info)
To use it.
- Extract the sosreport
# ll
-rw-------. 1 root root 21735576 Mar 7 15:57 sosreport-sat64test-123456-2019-03-07-obvjctv.tar.xz
#
# tar xf sosreport-sat64test-123456-2019-03-07-obvjctv.tar.xz
# ll
drwx------. 14 root root 4096 Mar 7 15:56 sosreport-sat64test-123456-2019-03-07-obvjctv
-rw-------. 1 root root 21735576 Mar 7 15:57 sosreport-sat64test-123456-2019-03-07-obvjctv.tar.xz
#
- Execute the command as below
<file path or $PATH>/sos_analyze.sh <sosreport_dir>
The output will be similar to below
$ ./sos_analyze.sh sosreport-sat64test-123456-2019-03-07-obvjctv
The sosreport is: sosreport-sat64test-123456-2019-03-07-obvjctv
### Welcome to Report ###
### CEE/SysMGMT ###
## Naming Resolution
## Network Information
## Selinux
## Installed Packages (satellite)
## Subscriptions
## Repos
## Upgrade
## Disk
## Memory
## CPU
## Messages
## Foreman Tasks
## Hammer Ping
## Katello service status
## MongoDB Storage
## PostgreSQL Storage
## Passenger
## Qpidd
## Foreman logs (error)
## Foreman cron
## Httpd
## RHSM
## Virt-who
## Hypervisors tasks
## Tomcat
## Candlepin
## Cron
## Files in etc/cron*
## Foreman Settings
## PostgreSQL
## Please check out the file /tmp/report-sosreport-sat64test-123456-2019-03-07-obvjctv.log
- Check the generated report file
$ less /tmp/report-sosreport-sat64test-123456-2019-03-07-obvjctv.log
Note. You will see the file as below. The content is all the commands executed by this script.
internals_help/executed_commands.txt
You can also pass some flags that can help you during this analysis. For example:
Please inform the path to the sosrepor dir that you would like to analyze.
./sos_analyze.sh [OPTION] 01234567/sosreport_do_wall
OPTION
You can add a flags after ./sos_analyze.sh as informed below
-c copies the output file from the /tmp directory to the current directory
-l opens the output file from the current directory
-t opens the output file from the /tmp directory
Hope you enjoy it.