Container-Optimized OS에는 Container-Optimized OS 가상 머신 인스턴스에서 문제를 디버그하는 데 도움이 되는 주문형 정보를 수집하는 sosreport 유틸리티가 포함되어 있습니다. 정보는 인스턴스의 파일 시스템에 로컬로 수집 및 저장됩니다. Google은 이 데이터를 다른 곳에서 수집하거나 저장하지 않습니다.
인스턴스 문제 때문에 Google Cloud 지원으로 지원 사례를 열면 조사의 일환으로 sosreport 데이터를 제공하라는 메시지가 표시 될 수 있습니다. 이 페이지는 이 정보를 수집하는 방법을 보여줍니다.
sosreport의 결과는 .tar.xz 아카이브에 암호화 없이 저장됩니다.
아카이브는 많은 중요한 시스템 구성요소(예: journald)에서 데이터를 수집하기 때문에 개인 식별 정보(PII)를 포함할 수 있습니다. 아카이브는 인스턴스에서 검사할 수 있으며 대부분의 내용은 일반 텍스트입니다. sosreport 도구는 오픈소스이므로 소스 코드를 검토할 수 있습니다.
sosreport 데이터 수집
보고서를 작성하려면 gcloud compute ssh 명령어를 사용하여 관련 가상 머신 인스턴스에 ssh로 연결합니다.
gcloud compute ssh [INSTANCE_NAME]
그러고 나서 다음 sosreport 명령어를 실행합니다.
sudososreport--all-logs--batch--tmp-dir=/var
다른 디렉터리를 --tmp-dir 옵션에 전달하여 보고서가 저장된 디렉터리를 변경할 수 있습니다. 인스턴스에서 /etc/sos.conf를 편집하여 명령어 기본 동작을 변경할 수도 있습니다.
출력은 --tmp-dir 옵션을 사용하여 지정한 디렉터리의 .tar.xz 파일에 저장됩니다. .tar.xz 파일의 위치와 체크섬은 STDOUT에 표시됩니다.
Your sosreport has been generated and saved in:
/var/sosreport-cos-20181106231224.tar.xz
The checksum is: 5a8b97c6020346a688254c8b04ef86ec
수집된 데이터 보기
이 보고서는 root이 소유하고 있으므로 다른 사용자가 읽을 수 없습니다. 다음 명령어를 사용하여 소유자를 현재 사용자로 변경하고 읽을 수 있게 하고, 전 세계에서 읽을 수 있게 하지 마세요.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2024-12-17(UTC)"],[[["\u003cp\u003eContainer-Optimized OS includes the \u003ccode\u003esosreport\u003c/code\u003e utility for debugging, which gathers diagnostic information locally on a virtual machine instance without Google storing it.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003esosreport\u003c/code\u003e data, which may contain PII, is stored as an unencrypted \u003ccode\u003e.tar.xz\u003c/code\u003e archive and can be requested by Google Cloud support when investigating issues.\u003c/p\u003e\n"],["\u003cp\u003eGenerating a \u003ccode\u003esosreport\u003c/code\u003e consumes CPU, memory, disk space, and I/O resources, and its collection may be challenging during node availability or startup issues due to auto-repair.\u003c/p\u003e\n"],["\u003cp\u003eTo collect the \u003ccode\u003esosreport\u003c/code\u003e, users must connect to the instance via SSH, check the OS version, and run the appropriate \u003ccode\u003esosreport\u003c/code\u003e or \u003ccode\u003esos report\u003c/code\u003e command, installing the \u003ccode\u003esosreport\u003c/code\u003e package if needed.\u003c/p\u003e\n"],["\u003cp\u003eOnce generated, users can view and extract the report's contents locally using \u003ccode\u003etar\u003c/code\u003e, and they can download the report to their local machine using \u003ccode\u003egcloud compute scp\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,["# Collecting debugging information using sosreport\n\nContainer-Optimized OS includes the `sosreport` utility, which collects\ninformation on demand to help you debug problems in a Container-Optimized OS\nvirtual machine instance. The information is collected and stored locally on\nthe filesystem of the instance. Google does not collect or store this data\nelsewhere.\n\nIf you open a support case with [Google Cloud support](/support)\ndue to problems with your instance, you may be asked to provide the `sosreport`\ndata as part of the investigation. This page shows you how to collect this\ninformation.\n| **Note:** Creating the report consumes CPU and memory resource, and storing the report consumes disk space and disk I/O bandwidth resource on the node. The amount of resource consumed cannot be easily estimated.\n| **Note:** When troubleshooting node availability and startup issues, collecting `sosreport` might be challenging. Node auto-repair will terminate and re-create the node after some time of unavailability. See [Disabling node auto-repair](/kubernetes-engine/docs/how-to/node-auto-repair#disable) if `sosreport` collection cannot be done before the node is terminated by auto-repair. If auto-repair cannot be disabled because the cluster is in release channel, contact Cloud Customer Care for assistance.\n\nThe output of `sosreport` is stored without encryption in a `.tar.xz` archive.\nThe archive may contain personally identifiable information (PII), because it\ncollects data from many critical system components (e.g. journald). The archive\ncan be inspected on the instance, and most content is in plain text. The\n`sosreport` tool is open source, and you can\n[review its code](https://cos.googlesource.com/cos/overlays/board-overlays/+/refs/heads/master/project-lakitu/app-admin/sosreport/).\n\nCollecting the sosreport data\n-----------------------------\n\nTo generate a sosreport:\n\n1. Connect to the instance using the `gcloud compute ssh` command.\n\n ```\n gcloud compute ssh [INSTANCE_NAME] --zone [ZONE] --project [PROJECT_ID]\n ```\n2. Check the OS version:\n\n sudo cat /etc/os-release| egrep -w 'NAME|VERSION'\n\n The output is similar to the following: \n\n NAME=\"Container-Optimized OS\"\n VERSION=105\n\n3. Run the `sos` command that corresponds to your OS version:\n\n### COS 85 and earlier\n\nRun the following `sosreport` command to collect the logs: \n\n sudo sosreport --all-logs --batch --tmp-dir=/var\n\nIf the previous command fails with `sosreport: command not found`, install the\n`sosreport` package and then run the previous `sosreport` command: \n\n sudo toolbox\n sudo apt install sosreport -y\n\n### COS 105 and later\n\nRun the following `sos` command to collect the logs: \n\n sudo sos report --all-logs --batch --tmp-dir=/var\n\nIf the previous command fails with `sos: command not found`, install the\n`sosreport` package and then run the previous `sos report` command: \n\n sudo toolbox\n sudo apt install sosreport -y\n\n### Ubuntu-18 and earlier\n\nRun the following `sosreport` command to collect the logs: \n\n sudo sosreport --all-logs --batch --tmp-dir=/var\n\nIf the previous command fails with `sosreport: command not found`, install the\n`sosreport` package and then run the previous `sosreport` command: \n\n sudo apt install sosreport\n\n### Ubuntu-20 and later\n\nRun the following `sos` command to collect the logs: \n\n sudo sos report --all-logs --batch --tmp-dir=/var\n\nIf the previous command fails with `sos: command not found`, install the\n`sosreport` package and then run the previous `sos report` command: \n\n sudo apt install sosreport\n\nYou can change the directory where the report is stored by passing a\ndifferent directory to the `--tmp-dir` option. You can also change the command's\ndefault behavior by editing `/etc/sos.conf` on the instance.\n\nThe output is stored in a `.tar.xz` file in the directory you specify using the\n`--tmp-dir` option. The location and checksum of the `.tar.xz` file is shown on\nSTDOUT. \n\n Your sosreport has been generated and saved in:\n /var/sosreport-cos-20181106231224.tar.xz\n\n The checksum is: 5a8b97c6020346a688254c8b04ef86ec\n\nViewing the collected data\n--------------------------\n\nThe report is owned by `root` and is not readable by other users. Use the\nfollowing commands to change the owner to your current user and make it readable\nby you. Do not make it world-readable. \n\n```\nTARBALL=[PATH/TO/TARBALL]\nsudo chown $(whoami) $TARBALL\nchmod +r $TARBALL\n```\n\nThen, if you want to view the content of the report on the node, you can extract\nit by running below command: \n\n tar xvf $TARBALL\n\nThe individual report files are now available in a directory in the same\nlocation as the `.tar.xz`. You can view the logs using commands such as `less`, or you\ncan use commands such as `grep` to find information in them.\n| **Note:** If you plan to share the report with Google, please do not modify any files in the report. If you have to modify some files, please also tell us what was modified when sharing the report.\n\nDownload the report\n-------------------\n\nTo download the report to your local machine, use the `gcloud compute scp`\ncommand: \n\n```\ngcloud compute scp $(whoami)@[INSTANCE_NAME]:[PATH/TO/FILE] [LOCAL/PATH/TO/DIRECTORY]\n```"]]