This article provides information on how to collect VMware vSAN support logs and upload them to Broadcom VCF Support.
vSAN support logs are contained in a normal ESXi support bundle in the form of vSAN traces. The vSAN support logs are gathered automatically by gathering the ESXi support bundle for the hosts.
Collecting Diagnostic data from the vSAN Native Trace Object (vSAN 8.0 U1+)
If you are attempting to gather longer vSANTraces from the Native vSAN Trace Object introduced in vSAN 8.1 - please follow the following instructions and remember to check the overall size of logs before continuing as they may exceed 500GB if configured for long retention times:
1) Connect to the vSAN Host via SSH
2) Confirm that native traces cover the time frame of the issue by running the command bellow:
ls -R /vmfs/volumes/vsanDatastore/.vsan.trace/
3) If the traces cover the time frame run the following command to include all data from the vSAN Native Trace Object:
vm-support -a Storage:VSANTracesExtended -w <localdatastore path>
4) Append vSANtraces to the file name that was generated before upload.
5) Repeat steps 1-4 on all hosts in the vSAN cluster.
6) Provide the log file that results to VMware Support as you normally would
If you should receive the below warning when attempting to collect the native trace logs it means encryption is enabled on the cluster and you need to follow the steps provided to supply a password.
WARNING main.py:590 Command cannot succeed because this host is in crypto safe mode and the vm-support incident key is missing.
To collect useful coredumps, perform these tasks:
1. Generate a vm-support incident key by running:
crypto-util keys vm-support --password prolog
2. Run vm-support:
vm-support [options]
3. Perform cleanup:
crypto-util keys vm-support epilog