Container-Optimized OS includes the sosreport
utility. sosreport
collects
information to help you debug problems in a COS virtual machine instance. The
information is collected and stored locally on the filesystem of the COS
instance. Google does not collect or store this data elsewhere.
If you open a support case with Google Cloud support
due to problems with your instance, you may be asked to provide the sosreport
data as part of the investigation. This page shows you how to collect this
information.
The output of sosreport
is stored without encryption in a .tar.xz
archive.
The archive may contain personally identifiable information (PII), because it
collects data from many critical system components (e.g. journald). The archive
can be inspected on the instance, and most content is in plain text. The
sosreport
tool is open source, and you can
review its code.
Collecting the sosreport data
The sosreport
command is included in COS milestone 69
and higher. To create a report, run the sosreport
command. You can change the directory where the report is stored by passing a
different directory to the --tmp-dir
option. You can also change the command's
default behavior by editing /etc/sos.conf
on the instance.
sudo sosreport --all-logs --batch --tmp-dir=/var
The output is stored in a .tar.xz
file in the directory you specify using the
--tmp-dir
option. The location of the .tar.xz
file is shown on STDOUT, as well
as the checksum:
Your sosreport has been generated and saved in:
/var/sosreport-cos-20181106231224.tar.xz
The checksum is: 5a8b97c6020346a688254c8b04ef86ec
Viewing the collected data
The report is owned by root
and is not readable by other users. Use the
following commands to change the owner to your current user and make it readable
by you. Do not make it world-readable.
TARBALL=[PATH/TO/TARBALL] sudo chown $(whoami) $TARBALL chmod +r $TARBALL
Then, if you want to view the content of the report on the node, you can extract it by running below command:
tar xvf $TARBALL
The individual report files are now available in a directory in the same
location as the .tar.xz
. You can view the logs using commands such as less
, or you
can use commands such as grep
to find information in them.
Download the report
To download the report to your local machine, use the gcloud compute scp
command:
gcloud compute scp $(whoami)@[INSTANCE_NAME]:[PATH/TO/FILE] [LOCAL/PATH/TO/DIRECTORY]