En ST Current DeploymentGuide Book
En ST Current DeploymentGuide Book
4/27/2021
Table of Contents
Log File Management Tool Deployment and User's Guide 8.5.104 4
Overview 5
Architecture 8
New in this Release 11
Downloading LFMT 13
Known Issues and Limitations 14
Migration to LFMT 8.5.104 15
Log File Management Tool Deployment Planning 17
LFMT Client - GAX Dependencies 18
LFMT Database Sizing 19
LFMT Storage and Resource Sizing 21
Log File Management Tool General Deployment 24
Prerequisites 25
Deployment of the LFMT Client 27
Deployment of the LFMT Indexer 29
Deployment of the LFMT Collector 32
Configuration of the LFMT Database 36
Initializing the DBMS 40
Deployment of Workbench Agent for LFMT 8.5.1 44
Installing Workbench Agent (Mass Deployment) for LFMT 8.5.1 49
Log File Management Tool Configuration Options 59
LFMT Host Object Configuration Options 60
LFMT GAX Configuration Options 61
LFMT Indexer Configuration Options 63
LFMT Collector Configuration Options 66
LFMT DAP Object Configuration Options 71
Workbench Agent Configuration Options (for LFMT 8.5.1) 72
Workbench Agent Host Object Configuration Options (for LFMT 8.5.102) 76
Log File Management Tool User's Guide 77
Configuration of Access Control for LFMT Users 78
Site Configuration 81
Collection Schedules 83
Force Collection 88
Indexing and Scrubbing 90
Log File Packaging 94
Available Packages 98
LFMT Audit Information 101
Additional Information 104
Configuration of TLS Connections 105
Best Practices 109
Regular Expressions 110
Release Notes 112
Log File Management Tool Deployment and User's Guide 8.5.104
Overview
Log files are an integral part of Genesys software. They are the main sources of information when troubleshooting
application issues. The faster that relevant, accurate, and consistent log files are provided, the sooner an issue can
be resolved. Unfortunately, many problems can occur when trying to retrieve the log files necessary for
troubleshooting. Common problems include:
• The log files for the time when the problem occurred have been overwritten or otherwise lost.
• Log files delivered are not within the event time frame.
• Log files provided were created with log levels not detailed enough for the investigation.
The Log File Management Tool utility is intended to minimize these issues, and thereby reduce the time required to
resolve customer problems.
Data Privacy
Important
The Genesys Customer Care LFMT product currently does not support access or erasure
requests for data that is stored for an extended period. In order to meet EU GDPR (European
Union General Data Protection Regulation) compliance, customers/partners should ensure that
the ‘LFMT Indexer’ application “retention_period” option is set to 30 days or less (if adherence to
EU GDPR is required).
LFMT Components
The LFMT has four main components: LFMT Client, LFMT Collector, LFMT Indexer and Workbench Agent.
• Provides a graphical user interface to configure and control the LFMT solution.
• Search, select, and download log files collected by the LFMT Collector.
Important
One LFMT Client can serve multiple LFMT Collector/LFMT Indexer pairs.
• Application hosts are queried for new or modified log files only.
• Log files are copied from application servers to the LFMT Server Host(s).
• Creates log file packages resulting from user queries in the LFMT Client.
• Masks sensitive data in log file packages created by a user in the LFMT Client.
• Receives scheduled or real-time log collection requests from the LFMT Collector
• Identifies new or modified log files to be sent to the LFMT Collector
• Log files can be compressed for transfer based on configuration (review the configuration section <name section>)
• Log files can be transferred securely or as plain text based on configuration (review the configuration section <name
section>)
• Application log files—*.log (including those that have been configured for circular logging)
• Core and dump files created after an application terminates unexpectedly—core.* and dmp.*.
Important
For log files to be accessible by the LFMT, the application must be provisioned in Configuration
Server with a configuration option of all set in the [log] section. The value of this option should
be set to the absolute path of the application log files.
Architecture
The following section describes the recommended architecture for an LFMT deployment. Although all LFMT
components can be deployed on a single host, the recommended architecture shows three hosts: the LFMT Server
Host, the LFMT Client Host, and the LFMT Database Host.
• Central Log Storage (CLS) repository, the central repository in which all log files for all applications using the tool are
stored.
• LFMT Collector, which collects the log files for storage in the Central Log Storage (CLS) repository and creates
packages for user downloads.
• LFMT Indexer, which monitors the CLS repository, indexes the files as they arrive at the CLS, and compresses the
CLS files for storage.
Important
LFMT Collector and LFMT Indexer must be deployed on the same host. Multiple LFMT Indexer/
Collector pairs can be deployed to service one LFMT solution. Only one LFMT Indexer/Collector
pair should be deployed on a single host.
• LFMT Client, a GAX plug-in that provides the interface through which users specify the log files to retrieve, package,
and upload to a given location.
Important
LFMT Client and GAX must be deployed on the same host. Only one LFMT Client is required for
each deployed LFMT solution.
• LFMT Database, the central repository where all information about the copied log files is stored.
Tip
To improve performance, the LFMT Database Host should be deployed in the same locale as the
LFMT Server Host. One LFMT Database is required for each LFMT Indexer/Collector pair.
Release 8.5.104
The 8.5.104 Log File Management Tool release primarily enables support for Oracle 19c. Several bug fixes and
performance improvements have also been made. Please see the Release Notes for further details.
Release 8.5.103
The 8.5.103 Log File Management Tool release primarily enables support for OpenJDK 8 and 11. Several bug fixes
and performance improvements have also been made. Please see the Release Notes for further details.
Release 8.5.102
The 8.5.102.00 Log File Management Tool release enables support for GAX 9.0.100.52 and later by using the
LFMT Client 8.5.102.00 component; for GAX versions 8.5.209 to 9.0.001.37, please use the LFMT Client
8.5.101.06 component (also included in the 8.5.102.00 LFMT package). Several bug fixes and performance
improvements have also been made. Please refer to the Release Notes for further details.
Release 8.5.101
The 8.5.101 Log File Management Tool release enables support for GAX 8.5.290.09 and later. This release also
enables audit capabilities for all configuration changes made within the Log File Management Tool. Several bug
fixes and performance improvements have also been made. Please refer to the Release Notes for further details.
Release 8.5.100
The 8.5.100 Log File Management Tool release significantly improves log file collection by moving to an agent-
based transfer. By using an agent to perform the log file transfers, the Log File Management Tool no longer
leverages rsync over SSH to transfer files. The transfers are now performed over a TCP/TLS connection to the
agent, which prevents the need for public-key authentication between hosts.
In addition to the moving to an agent-based transfer, the following features have been added to the 8.5.1 release:
• Support for user roles to enable/disable LFMT functionality for different user groups
• Support for circular log file types i.e. (File.log, File.1.log, File.1.log, File.x.log)
Release 8.5.000.XX
• LFMT Build 8.5.000.XX requires the Java 8 Runtime Environment (JRE).
• LFMT database(s) are configured using Database Access Point (DAP) configuration objects.
• LFMT Client can schedule/force collections for multiple connected LFMT Collectors.
• LFMT Client can search multiple connected LFMT databases.
• LFMT Client displays to which applications custom regular expressions have been assigned.
• LFMT Client has new section 'Available Packages' for downloading previously created packages.
• LFMT Collector and LFMT Indexer are configured as separate applications in Configuration Server.
Downloading LFMT
Follow these steps to download LFMT:
1. Login to My Support.
4. On the Apps and Tools screen, select the Log File Management Tools tile.
5. On the Genesys Care Log File Management Tool screen, click Download LFMT link.
6. On the Terms and Conditions screen, click the checkbox to accept the Terms and Conditions, and click Download.
• In a multisite environment, if one or more of the databases are down, the LFMT Client does not populate panes
correctly.
It is required that the LFMT Collector, Indexer and Workbench Agents are updated to 8.5.103.xx. The LFMT Client
must be at least version 8.5.101.06 or 8.5.102.02 (depending on the GAX version -- see release notes). These
components are not backwards compatible with the 8.5.101.xx/8.5.100.xx versions.
Important
After updating the LFMT Client to 8.5.101.xx/8.5.103.xx, please ensure that there is not an
"original-gax-lfmt.jar" file in the {GAXInstall}/webapp/WEB-INF/lib directory. If this file does exist,
please delete the file.
Database
Moving from LFMT 8.5.000.xx/8.5.100.xx to 8.5.101.xx/8.5.103.xx does require a schema update to the already
existing database tables. The update scripts are provided in the {CollectorInstall}/utilities/dbscripts folder. After the
scripts have been run, all data will be preserved in the existing database.
It is required that all of the LFMT components are updated to 8.5.100.xx (LFMT Client, Indexer, and Collector).
These components are not backwards compatible with the 8.5.000.xx versions. The Workbench Agent release
8.5.100.xx is also required to be deployed to all application hosts. Please see the Workbench Agent deployment
guide for further information.
Database
Moving from LFMT 8.5.000.xx to 8.5.100.xx does not requires any schema changes to the already existing
database tables. The same provisioned database from LFMT 8.5.000.xx can continue to be used for LFMT
8.5.100.xx.
Please note that the sizing and performance recommendations are based on tests performed in an environment of
up to 1000 agents; therefore these should be used as guidelines only. Please monitor your environment and apply
your observations and experience to the formulas presented here to extrapolate the actual sizing of your LFMT
environment.
• The log_file table holds the names and locations of the log files stored in CLS.
• The log_file_indexed_token table holds any custom index reference defined by the customer for specific application
types.
LFMT will write 1 record per log file to the LFMT database. Also, LFMT will write 1 records per index found in each
log file to the LFMT database, as per the configured indexes in the environment.
Important
The above values are the equivalent to 10MB log files compressed at a 10-1 ratio.
Sample calculation:
Important
• The DB space utilized by LFMT is highly dependent on the number of indexes configured per file
type. When using the Simplified LFMT sizing method, we recommend you start by configuring a low
log file retention period (e.g.: 3 or 4 days) and then adjust it accordingly after data collection is
started and it is clear there is sufficient DB space to handle all the indexes, or adjust the space
accordingly.
• The maximum value for the ID is 2,147,483,647 for both the LOG_FILE and
LOG_FILE_INDEXED_TOKEN TABLES. Please periodically monitor the value of the ID in both the
tables and if it is approaching the said maximum value, the ID will need to be manually re-seeded
(via the sequence for Oracle and PostGres, and via the Identity Column for MSSQL.
Sizing Approach
LFMT sizing can be approached in two ways:
• The Detailed Sizing procedure facilitated by the sizing table below will guide you to collect the information required to
produce a strong estimate for your LFMT sizing needs. This will allow you to factor in your expected call volumes
including peaks, your preferred log retention period, etc.
• If a more expedient LFMT sizing is preferred, the Simplified sizing can provide a guide to get you started more
quickly. However, please note:
• These are approximate, and you may need to adjust your data retention period so that your log producing rate
does not overfill the CLS central file storage.
• It is recommended that you provision the hardware in a way that is easily extendable in the future so you can
adjust it to your preferences. E.g. Perhaps your environment data generation rate only allows for 6 days of logs
stored on the default proposed storage but your company prefers a longer period, then additional storage may
need to be planned.
• The first is the space for the host Operating System and the LFMT applications installation.
• The seconds is the CLS storage – the space used by LFMT as workspace and storage for the Log Files it collects and
manages.
For the first part, Genesys recommends that the LFMT Indexer and LFMT Collector be installed on the same drive
where the host Operating System resides. Minimum recommended storage for this drive is as follows:
A separate/additional drive (local to the Collector Host and not a mapped network drive) is recommended for
housing the Central Log Storage (CLS). To calculate CLS storage requirements, download and refer to the
Genesys Log File Management Tool Sizing Template.
Use the following table to estimate the Memory and CPU requirements for the LFMT Server Host(s). From the
sizing template results, average throughput for log generation, or CLS storage requirements can be used as a
reference.
CPU-Processor (Xeon-
Average Throughput Memory CLS Storage*
class 2.2 GHz or better)
Less than 2MB/s One quad-core processor 4GB to 8GB Up to 500GB
Between 2-10MB/s Two quad-core processors 8GB Up to 2.5TB
Three quad-core
Between 10-25MB/s 16GB Up to 7.5TB
processors
Between 25-50MB/s Four quad-core processors 16GB Up to 15TB
Greater than 50MB/s Please consult with Genesys Customer Care.
• The first is the space for the host Operating System and the LFMT applications installation.
• The seconds is the CLS storage – the space used by LFMT as workspace and storage for the Log Files it collects and
manages.
For the first part, recommends that the LFMT Indexer and LFMT Collector be installed on the same drive where the
host Operating System resides. Minimum recommended storage for this drive is as follows:
A separate/additional drive is recommended for housing the Central Log Storage (CLS). To calculate CLS storage
requirements, refer to the table below.
Use the following table to estimate the Memory and CPU and storage requirements for the LFMT Server Host(s).
Average daily call volume can be used as a reference. Note that a deployment would typically have a separate
LFMT Server host per datacenter so the sizing should represent the call volume handled by that datacenter.
CPU-Processor (Xeon-
Average Daily Calls Memory CLS Storage*
class 2.2 GHz or better)
Less than 10k One quad-core processor 4GB to 8GB 200GB
Between 10k-30k Two quad-core processors 8GB 500GB
Three quad-core
Between 30k-120k 16GB 2TB
processors
Please consult with Genesys Customer Care. (Detailed Sizing approach
Greater than 120k
recommended)
Important
Storage is based on calculations for 7 days of log files and includes allowance for the operation of
the application. When using the Simplified LFMT sizing method, we recommend you start by
configuring a low log file retention period (e.g. 3 or 4 days) and then adjust it accordingly after data
collection is started and it is clear there is sufficient space for additional retention.
Prerequisites
Software Requirements
LFMT supports the following Operating Systems:
The following software must be installed before deploying the Log File Management Tool:
The LFMT Client is web-based, and is compatible with the following web browsers:
Important
LFMT supports Microsoft Edge since 8.5.100.03. Please refer to LFMT Client
2. Open the following internal ports between the LFMT Server Host and the Genesys application servers.
b. Port 135 for WMI - Required only during LFMT installation and configuration (Windows only)
3. Ensure the following access ports are available for LFMT operation.
a. The DBMS access port (Required if the DBMS is located on a different host than LFMT Indexer):
4. (Optional) Open the following external ports for the LFMT (S)FTP/S operation.
a. Ports 20 and 21
5. (Optional) Assign dedicated NICs on each Genesys application server for LFMT operation.
6. (Optional) To enable Log File Retrieval services, configure ports 80 & 443 for outbound TCP access.
Important
LFMT Client places plug-in files in the <GAX Installation Directory>\webapp\WEB-INF\lib folder.
This folder is created the first time GAX is started. Please ensure GAX has been started at least
once prior to the installation of the LFMT Client.
4. Ensure the .jar files in the <LFMT Client Install Directory> have been copied to <GAX Installation
Directory>/webapps/WEB-INF/lib.
b. Enter the Destination Folder for the LFMT Client installation and click Next.
5. Ensure the .jar files in the <LFMT Client Install Directory> have been copied to <GAX Installation
Directory>\webapps\WEB-INF\lib.
3. In the Applications section, select the GAX Application to be configured for use with the LFMT Client.
7. Add and configure the following section and options in the GAX configuration object.
Tip
For more information on the GAX LFMT configuration options, please refer to the LFMT GAX Configuration Options section.
9. Restart GAX.
5. In the Import Application Template dialog, click the Choose File file button and navigate to the LFMT
Indexer .apd template. Select the template, and click the OK button to confirm the template import.
6. In the New Properties pane, select the Save button to save the new application template.
7. Once the application template has been imported, navigate to Configuration Manager.
a. In the General tab, enter a name for the LFMT Indexer application in the Name field,.
b. Click on the Template field and navigate to the application template created above.
e. Click on the Host field and navigate to the host where LFMT Indexer will be installed.
f. In the Application Options tab, review and configure the LFMT Indexer options.
Tip
For more information on the LFMT Indexer configuration options, please refer to the LFMT Indexer Configuration Options
section.
2. When prompted, confirm the host name of the computer on which LFMT Indexer is to be installed.
3. When prompted, specify the host and port to the Configuration Server associated with this LFMT Indexer.
4. When prompted, specify the username and password to access the Configuration Server.
5. When prompted, specify the host and port to the Backup Configuration Server associated with this LFMT Indexer.
6. When prompted, select the LFMT Indexer Application object you configured in “Provisioning the LFMT Indexer” from
the list of applications and click Next.
3. When prompted, specify the connection parameters to the Configuration Server associated with this LFMT Indexer and
click Next.
4. When prompted, select the LFMT Indexer Application object you configured in “Provisioning the LFMT Indexer” from
the list of applications and click Next.
5. Enter the Destination Folder for the LFMT Indexer installation and click Next.
6. (Optional) Enter the Host name and Port of the Backup Configuration Server associated with this LFMT Indexer and
click Next.
3. In the Applications section, locate and open the LFMT Indexer application.
4. In the General tab, verify that the following parameters have been updated by the installation process.
• Command Line Arguments: -app <LFMT Indexer Application Name> -host <Configuration Server
Host> -port <Configuration Server Port> -backuphost <Backup Configuration Server Host> -
backupport <Backup Configuration Server Port>
Important
The backuphost and backupport options are optional. These options are read from the
Command Line Arguments field of the LFMT Indexer object only.
Important
LFMT Collector must be installed on the same host as LFMT Indexer.
5. In the Import Application Template dialog, click the Choose File button and navigate to the
LFMT_Collector.apd template. Select the template and keep the template name as “LFMT_Collector”. If the name is
not "LFMT_Collector", please change the name to "LFMT_Collector". This is important for the agents to identify the
collector applications within the environment. Click the OK button to confirm the template import.
6. In the New Properties pane, select the Save button to save the new application template.
7. Once the application template has been imported, navigate to Configuration Manager.
a. In the General tab, enter a name for the LFMT Collector application in the Name field,.
b. Click on the Template field and navigate to the application template created above.
e. Click on the Host field and navigate to the host where LFMT Collector will be installed.
f. In the Application Options tab, review and configure the LFMT Collector options.
Tip
For more information on the LFMT Collector configuration options, please refer to the LFMT Collector Configuration
Options section.
2. When prompted, confirm the host name of the computer on which LFMT Collector is to be installed.
3. When prompted, specify the host and port to the Configuration Server associated with this LFMT Collector.
4. When prompted, specify the username and password to access the Configuration Server.
5. When prompted, specify the host and port to the Backup Configuration Server associated with this LFMT Collector.
6. When prompted, select the LFMT Collector Application object you configured in “Provisioning the LFMT Collector” from
the list of applications and click Next.
3. When prompted, specify the connection parameters to the Configuration Server associated with this LFMT Collector
and click Next.
4. When prompted, select the LFMT Indexer Application object you configured in “Provisioning the LFMT Collector” from
the list of applications and click Next.
5. Enter the Destination Folder for the LFMT Collector installation and click Next.
6. (Optional) Enter the Host name and Port of the Backup Configuration Server associated with this LFMT Collector and
click Next.
3. In the Applications section, select the GAX Application configured for use with the LFMT Client.
5. In the Connections tab, add a connection to the LFMT Collector GAX will control.
Important
A single GAX may have connections to more than one LFMT Collector instances.
7. Restart GAX.
3. In the Applications section, locate and open the LFMT Collector application.
4. In the General tab, verify that the following parameters have been updated by the installation process.
• Command Line Arguments: -app <LFMT Collector Application Name> -host <Configuration Server
Host> -port <Configuration Server Port> -backuphost <Backup Configuration Server Host> -
backupport <Backup Configuration Server Port>
Important
The backuphost and backupport options are optional. These options are read from the
Command Line Arguments field of the LFMT Collector object only.
Important
The LFMT Database is not the GAX Database. The GAX database is still required for proper GAX
functionality.
2. Locate the LFMT Database initialization script that corresponds to your DBMS. The following table lists database types
and their corresponding script names.
DBMS Script
PostgreSQL lfmdb_8.5XX.XX_postgres.sql
Oracle lfmdb_8.5XX.XX_ora.sql
Microsoft SQL lfmdb_8.5XX.XX_mssql.sql
3. In your DBMS interface, load and execute the initialization script that corresponds to your DBMS.
2. From the Environment section, select Application Templates and click New .
3. In the Application Templates section, enter a name for the DAP Template in the Name text field.
4. Choose Database Access Point as the template type from the Type dropdown.
5. Enter 8.5 for the DAP version in the Version text field.
7. Once the application template has been created, navigate to Configuration Manager.
10. In the New Properties pane, select the General tab. Complete the following:
a. In the General tab, enter a name for the LFMT DAP in the Name field.
b. Click on the Template field and navigate to the application template created above.
c. Click on the Host field and navigate to the host where LFMT Database resides.
d. Choose JDBC as the connection type from the Connection Type dropdown.
e. Choose Any as the case conversion type from the Case Conversion dropdown.
h. Enter 15 for the DB timeout in the JDBC Query Timeout text field.
j. Enter the LFMT Database name in the Database Name text field.
l. Enter the LFMT Database user password in the User Password text field.
a. Set the value of the default communication port to the listening port of your DBMS. Default ports are listed
below:
12. Select the Application Options tab. Review and configure the LFMT DAP options.
c. Set the value of the site option to a unique identifier for the LFMT Database.
Important
Ensure that the site option for each LFMT DAP in the LFMT solution is different.
Tip
For more information on the LFMT DAP configuration options, please refer to the LFMT DAP
Configuration Options section.
3. In the Applications section, select the GAX Application configured for use with the LFMT Client.
5. In the Connections tab, add a connection to the LFMT DAP to which GAX will connect.
Important
A single GAX may have connections to more than one LFMT DAP instances.
7. Restart GAX.
3. In the Applications section, select the LFMT Indexer that will access the LFMT Database.
5. In the Connections tab, add a connection to the LFMT DAP to which LFMT Indexer will connect.
Important
A LFMT Indexer may have only one connection to a LFMT DAP instance.
3. In the Applications section, select the LFMT Collector that will access the LFMT Database.
5. In the Connections tab, add a connection to the LFMT DAP to which LFMT Collector will connect.
Important
A LFMT Collector may have only one connection to a LFMT DAP instance.
• On Linux
• On Windows
On Linux
Prerequisites
PostgreSQL
1. If the postgres user is not already created, create it now by entering the following commands at the prompt, and
press Enter after each command:
adduser postgres
su -postgres
3. Create the database called lfm by entering the following command at the prompt:
./bin/createdb lfm
Warning
The database name of lfm is chosen in this procedure for simplicity, and is used throughout these instructions. You do not
have to use lfm, but if you choose to use a different name, be careful to use the correct name in subsequent steps. This
name is case sensitive
4. Locate the PostgreSQL intitialization script lfmdb_XXXXX_postgres.sql from <LFMT Server Install
Directory>/utilities/dbscripts directory.
5. Enter the command ./bin/psql -d lfm, and press Enter. This creates the tables required in the LFMT Database.
Oracle
1. Refer to the Oracle documentation to install the Oracle Database Management System on the host machine that
corresponds to the Host that you want to create the Database that will be used by LFMT.
2. Use the following SQL commands to create the users and ensure that they do not have excessive permissions:
3. Initialize the database by executing the following script: lfmdb_XXXXX_ora.sql , available in the following folder:
<LFMT Server Install Directory>/utilities/dbscripts/
Microsoft SQL
1. Refer to the MSSQL documentation to install the MSSQL Database Management System on the host machine that
corresponds to the Host that you want to create the Database that will be used by LFMT.
On Windows
Prerequisites
PostgreSQL
a. From the Windows Start menu, navigate to All Programs > PostgreSQL and select pgAdmin III.
b. In the Object browser, navigate to Server Groups > Servers and double-click PostgreSQL v.<version
number> <local host>:<default port>, providing your particular version, host, and port information.
e. Enter the name lfm and leave the other fields blank.
7. In a separate text editor, open the lfmdb_XXXXX_postgres.sql file found in the <LFMT Server Install
Directory>\utilities\dbsripts directory.
a. For PostgreSQL:
i. Copy the contents of the lfmdb_XXXXX_postgres.sql file and paste it into the SQL script editor.
iii. Confirm that the script has executed without errors or warnings, and that the database has been
successfully initialized with the correct data model.
Important
• The database name is case-sensitive.
• In the line, change only the IP address, port, and database name information.
• To connect to a remote database, you must modify the pg_hba.conf file, located in the data
directory of your PostgreSQL installation. Open the file in a text editor, and add the following line at
the end of the file: host all all 0.0.0.0/0 trust.
• You must also ensure that the value of listen_addresses contained in the postgresql.conf
file contains the IP Address of any host connecting to the LFMT database.
Oracle
1. Refer to the Oracle documentation to install the Oracle Database Management System on the host machine that
corresponds to the Host that you want to create the Database that will be used by LFMT.
2. Use the following SQL commands to create the users and ensure that they do not have excessive permissions:
3. Initialize the database by executing the following script: lfmdb_XXXXX_ora.sql , available in the following folder:
<LFMT Server Install Directory>\utilities\dbscripts\
Microsoft SQL
1. Refer to the MSSQL documentation to install the MSSQL Database Management System on the host machine that
corresponds to the Host that you want to create the Database that will be used by LFMT.
Tip
Before working with Workbench Agent, please refer to the Software Requirements section.
Important
Workbench Agent (WBAgent) must be installed on all the hosts running Genesys Platform
applications from which you want to collect log files. When a new WBAgent is deployed to the
environment, or when any configuration changes are made to an WBAgent, the LFMT Collector
must be restarted for the changes to be accepted by the LFMT.
The following directories in the Workbench installation package contain the Workbench Agent templates:
Important
The Workbench Agent can be deployed manually or by using the Agent Mass Deployer. The Mass
Deployer is included within the utilities directory found inside the LFMT Collector working directory.
If you use the Mass Deployer, you do not need to provision the Workbench Agent application in
GAX, as this will be done automatically during the deployment process. Please see the
“Deployment of Workbench Agent for LFMT 8.5.1” section for further details..
5. In the Import Application Template dialog, click the Choose File button and navigate to the CC_Agent.apd
template. Select the template and keep the template name as “CC_Agent”. If the name is not "CC_Agent", please
change the name to "CC_Agent". This is important for the Collector to identify the agents within the environment. Click
the OK button to confirm the template import.
6. In the New Properties pane, click Save to save the new application template.
7. Once the application template has been imported, navigate to Configuration Manager.
10. In the New Properties pane, complete the following (some of these are temporary values and will be updated once the
actual Workbench Agent software has been installed on the desired host)::
a. In the General tab, enter a name for the Workbench Agent application in the Name field.
b. Click on the Template field and navigate to the application template created above.
e. Click on the Host field and navigate to the host where Workbench Agent will be installed.
f. In the Application Options tab, review and configure the Workbench Agent options.
Tip
For more information on the Workbench Agent configuration options, please refer to the
Workbench
Agent Configuration Options section
g. In the Ports tab, add the following listening ports: default = <an open port on the Workbench Agent host>
(select whether this should be a Secured port or an Unsecured port)
h. In the Permissions tab, grant the SYSTEM account (or the defined “Login As” account) full control
Important
If the “default” port identified above is selected to be Secured, the LFMT Collector(s) will
communicate with this Agent using TLS, otherwise, the communication will be Non-TLS.
4. Enter the Workbench Server application name (i.e. "Workbench_Server") defined in GAX (Configuration Server) and
click Next.
Important
Workbench Server is optional; please enter "Workbench_Server" to progress if Workbench is
not deployed.
5. Enter the Host name and Port of the Primary Configuration Server.
6. Enter the destination folder where the Workbench Agent application will be installed, and click Next.
7. After the installation completes, go to the Workbench Agent installation directory and start the Workbench Agent by
running the command wbagent_startup.sh -host <cfghost> -port <cfgport> -app <wbAgentapp> where:
4. Enter the Workbench Server application name (i.e. "Workbench_Server") defined in GAX (Configuration Server) and
click Next.
Important
Workbench Server is optional; please enter "Workbench_Server" to progress if Workbench is
not deployed.
5. Enter the Host name and Port of the Primary Configuration Server.
6. Enter the destination folder where the Workbench Agent application will be installed, and click Next.
7. After the installation completes, go to the Workbench Agent installation directory and start the Workbench Agent by
running the command startServer.bat
Important
You can also use GAX to start and stop the Workbench Agent.
*ftmessaging = <an open port on the LFMT Collector host> (this port will be used by agents that will transf
*sftmessaging = <an open port on the LFMT Collector host> (this port will be used by agents that will encry
Important
• Ensure that the ftmessaging port is identified as an “Unsecured” port in its properties
• Ensure that the sftmessaging port is identified as a “Secured” port in its properties
7. Repeat the above steps for all LFMT Collector applications in your environment.
3. In the Applications section, locate and open the Workbench Agent application
4. In the General tab, verify that the following parameters have been updated by the installation process.
Important
The backuphost and backupport options are optional. These options are read from the Command Line
Arguments field of the Workbench Agent object only.
Mass Deployer Central Host The server where the mass deployer will be executed. It connects to the Remote
hosts via different protocols depending on the Remote Host operating system. It requires a configuration file that
provides credentials and connection details about the remote hosts.
Remote Hosts The hosts where the Workbench agent will be deployed. The agent will be extracted in the working
directory specified in the Mass Deployer configuration file.
Configuration Server The properties of Remote hosts are retrieved from this server, including their IP address in
order to connect to them. Every Workbench Agent deployed in Remote Hosts is provisioned in this Configuration
Server.
Prerequisites
Software Requirements The Central and Remote hosts should have one of the following operating systems:
Windows
Linux
Important
• If the central host is a Linux host it will only be able to mass deploy the agent to Linux Remote hosts.
• If the central host is a Windows host, it can mass deploy to other Windows and Linux Remote hosts.
• If a Workbench Agent is already deployed to a remote host, the agent must be uninstalled prior to
running the Mass Deployer. This is a limitation that will be addressed in a future release.
Before using the Mass Deployer, the following software must be installed in the central and remote hosts:
• If using a Windows Server, make sure that Powershell is enabled. The Mass Deployer requires Powershell v2.0 or a
later version.
Communication Requirements
• The central host should be able to reach the Linux remote hosts using SSH.
• The remote hosts where the agent will be deployed should be able to receive SSH connections from the Mass
Deployer Host. An SSH Server (e.g. OpenSSH) should be enabled. Commands and files will be sent using SSH and
SFTP respectively.
• Powershell should be enabled. The Mass Deployer requires v2.0 or a later version.
• The remote hosts should be included in the Trusted Hosts List of the central host in order to correctly connect to them
using Powershell Remoting (Windows Remote Management – WinRM).
• The Mass Deployer will try to temporarily modify the trusted host list in order to connect to the remote hosts. To do
this, the Mass Deployer should be executed from a command prompt with administrative privileges. Otherwise,
the Mass Deployer will continue to execute, but the trusted host list should be modified by the user before starting
the Mass Deployer.
• You can use the following command replacing the “*” with the list of remote host IP addresses. The “*” would
indicate that all hosts are trusted.
• The remote hosts should be able to receive remote Powershell commands. The WinRM service should be enabled to
allow this remote access. A way of enabling it is running the following command from Powershell with administrative
privileges:
• Enable-PSRemoting –Force
• This will start or restart the WinRM service and create the listener to accept requests from any IP address.
• The Mass Deployer will copy the Installation Package and extract it in a folder called “tmp_install” inside the provided
working directory. If it doesn’t exist, the Mass Deployer will try to create it.
Execute the following command in Powershell on the central host to ensure that WinRM remoting is properly
configured in a remote host and is accepting requests:
• wsmid: http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
• ProtocolVersion: http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
The “Stack” version will change depending on the remote host WinRM service.
The working directory of the Mass Deployer in the central host should have the following structure:
{ “config_server” : CfgServer,
“app_template_name” : <string>,
“app_name_prefix” : <string>,
“app_parent_folder” : <string>,
“deployments”:Deployments,
“agent” : <string>,
“linux_ip_path” : <string>,
“windows_ip_path” : <string>,
“wb_server_app” : <string>,
“global_listening_ports” : GlobalListeningPorts,
“global_options” : GlobalOptions,
“windows_global_options” : WindowsGlobalOptions,
“linux_global_options” : LinuxGlobalOptions }
CfgServer section:
Includes the connection parameters required to interact with the Configuration Server.
Required: Yes
{ "ip_addr": <string>
"port" : <number>,
"username" : <string>,
"password" : <string>,
"app_client_name" : <string> }
app_template_name The name of the Workbench Agent Application Template. This template will be used to
provision all agents. Required: If provisioning to Configuration Server.
app_name_prefix The prefix that will be used to name the new Workbench Agent Applications that will be
provisioned. The name of the Application will be <app_name_prefix><Remote Host name> Required: If provisioning
to Configuration Server.
app_parent_folder The folder where the application object will be stored in Configuration Server. If this folder
doesn’t exist, the Mass Deployer will try to create it. If not provided the application will be created in the root of the
Applications section. Required: No
Deployments section:
Includes the properties of the hosts where the Agent will be deployed. It is a list with one object per deployment.
Required: Yes
[ { "cfg_server_host_name": <string>
"username" : <string>,
"password" : <string>,
}, . . . ]
• username - The username used to connect to the remote host using SSH or a Powershell Remote session.
• working_dir - The directory where the agent will be extracted and from where it will be executed
NOTE: Make sure that each host in Configuration Server has an Operating System in the “OS Version” property.
This is used by the Mass Deployer to decide how to connect to the remote host.
agent
Path to the Workbench Agent distribution. If deploying from Windows, the path should have double backslashes (\\).
For example: /home/genesys/WBAgent_8.5.000.31.zip.
linux_ip_path
Relative path to the Linux installation package directory inside the agent package. For example: /IPs/
WBAgent_UNIX_8.5.000.31/linux/b1/ip.
windows_ip_path
Relative path to the Windows installation package directory inside the agent package. It requires double
blackslashes. For example: \\IPs\\WBAgent_Windows_8.5.000.31\\windows\\b1\\ip.
wb_server_app
Name of the Workbench Server application that will interact with the Agent being deployed/provisioned, as it
appears in Configuration Server. This is used during the installation of the Workbench Agent.
GlobalListeningPorts section:
The list of listening ports that will be used when provisioning the Workbench Agents in Configuration Server. Each
port is a JSON Object with an ID and a value.
[ { "ID": <string>
"value" : <number>
}]
GlobalOptions section:
A JSON object with the options that will be assigned to the Workbench Agents being provisioned. Options are
grouped by sections and all values should be strings.
{ <section_name_1> :
{ <option_name_1>: <option_value_1>,
<option_name_2>: <option_value_2>,
… <option_name_n>: <option_value_n>
}, <section_name_2> :
{ <option_name_1>: <option_value_1>,
… <option_name_n>: <option_value_n>
}, …, <section_name_n> :
{ <option_name_1>: <option_value_1>,
… <option_name_n>: <option_value_n>
}}
{ “log” :
{ “all”: “C:\\logs\\workbench_logs”,
WindowsGlobalOptions section:
A JSON object with the options that will be assigned to the Workbench Agents if being provisioned to a Windows
host. The structure of this JSON object is the same as the one described in the GlobalOptions section. If the same
property is set in both the GlobalOptions and the WindowsGlobalOptions section, the latter will be used.
Required: No.
LinuxGlobalOptions section:
A JSON object with the options that will be assigned to the Workbench Agents if being provisioned to a Linux host.
The structure of this JSON object is the same as the one described in the GlobalOptions section. If the same
property is set in both the GlobalOptions and the LinuxGlobalOptions section, the latter will be used.
Required: No.
Short argument: -c
Mandatory: Yes
Short argument: -m
Mandatory: Yes
*provision: Connects to configuration server and provisions the Agent apps in the
configuration file.
*deploy: Copies the agent to the remote hosts and installs it.
*provision_deploy: Provisions the agent apps in Configuration server and then installs
the agents on the remote hosts.
Short argument: -e
Mandatory: No
Description: Cancels the execution if one of the deployments fail. If not included, the
mass deployer will continue deploying to other hosts even if one of the previous
deployments failed.
Short argument: -o
Mandatory: No
Description: Overwrites the Config Server Apps if they are already provisioned. If not
included, the mass deployer will fail if an application previously existed.
Be aware that:
• The Mass Deployer executes the installer of the Workbench Agent in silent mode.
• This version of the Mass Deployer will not monitor the outcome of the silent installation. This has to be done by
checking the genesys_install_result.log file that is generated in the working directory of the Agent App.
Important
• As a known issue, the Mass Deployer might not work properly if there are disconnected Network
drives in the central host. Try removing these network drives before running the Mass Deployer. If
you see an error message similar to: “Attempting to perform the InitializeDefaultDrives operation on
the 'FileSystem' provider failed” when opening a new Powershell terminal, then the Mass Deployer
will not behave appropriately.
• It has also been observed in some occasions that power shell processes will remain active after the
Mass Deployer has finished executing. Please check the running applications after finishing
deployment and manually clean-up any open power shell processes
lfmt Section
The options in this section correspond to the host object to which LFMT Collector will connect.
nic
Specifies the hostname/IP of the Network Interface Card (NIC). Use this option if you are using a dedicated network
interface for file transfer from this host.
lfmt Section
This section contains options for general configuration of the application.
use_lfm_extension
Default Value: false
Valid Values: true or false
Changes Take Effect: After restart of GAX.
If set to true, the created log file package(s) will use the .lfm extension else .zip extension is used.
ftp_host
Default Value: No default value
Valid Values: Valid (S)FTP/S IP/hostname address
Changes Take Effect: After restart of GAX.
ftp_port
Default Value: No default value
Valid Values: Valid (S)FTP/S port number, must be an integer
Changes Take Effect: After restart of GAX.
ftp_pwd
Default Value: No default value
Valid Values: Valid (S)FTP/S password
Changes Take Effect: After restart of GAX.
ftp_user
Default Value: No default value
Valid Values: Valid (S)FTP/S username
Changes Take Effect: After restart of GAX.
app_config Section
This section contains options for general configuration of the application.
app_type
Default Value: indexer
Valid Values: indexer
Changes Take Effect: After restart of LFMT Indexer.
cls_location
Default Value: No default value
Valid Values: Valid path through the system (i.e. "C:\CLS")
Changes Take Effect: After restart of LFMT Indexer.
Specifies the path (local to Collector Host and not a mapped network drive) through the system to the folder or
directory where the CLS is located. RSYNC will transfer files to this location. For example, C:/GCTI/CLS.
retention_period
Default Value: 3
Valid Values: Any positive integer
Changes Take Effect: After restart of LFMT Indexer.
Specifies the number of days that the unmodified files are stored in CLS before being they are deleted permanently.
This value should be greater than or equal to the value of the LFMT Collector collection_period option.
log Section
This section contains all options relating to creating, viewing, and otherwise using the Centralized Log facility in
Genesys software.
all
Default value: No default value
Valid Values: [filename]
Changes Take Effect: After restart of LFMT Indexer.
Specifies the file location to which the application sends all log events.
expire
Default value: 10
Valid Values: [number] Specify a number from 1–1000.
Changes Take Effect: After restart of LFMT Indexer.
Determines how many log files are kept before they are deleted.
segment
Default value: 5000
Valid Values: [number] - Specify a value in kilobytes.
Changes Take Effect: After restart of LFMT Indexer.
verbose
Default value: all
Valid Values:
• debug - DEBUG, INFO, WARN, FATAL, and ERROR log events are printed.
• info - INFO, WARN, FATAL, and ERROR log events are printed.
thread_setting Section
This section defines the number of threads required for the indexed to process files in parallel.
max_queue
Default value: 40
Valid Values: Any integer
Changes Take Effect: After restart of LFMT Indexer.
Specifies the number of files to keep in the queue when all the threads are busy before the indexer starts
generating exceptions.
max_threads
Default value: 40
Valid Values: Any integer
Changes Take Effect: After restart of LFMT Indexer.
Specifies the maximum number of threads required to process the files in parallel.
min_threads
Default value: 20
Valid Values: Any integer
Changes Take Effect: After restart of LFMT Indexer.
app_config Section
This section contains options for general configuration of the application.
app_type
Default Value: collector
Valid Values: collector
Changes Take Effect: After restart of LFMT Collector.
cls_location
Default Value: No default value
Valid Values: Valid path through the system (i.e. "C:\CLS")
Changes Take Effect: After restart of LFMT Collector.
Specifies the path (local to the Collector Host and not a mapped network drive) through the system to the folder or
directory where the CLS is located. The Workbench Agent will transfer files to this location. For example,
C:/GCTI/CLS.
collection_period
Default Value: 3
Valid Values: Any positive integer
Changes Take Effect: After restart of LFMT Collector.
Specifies the maximum number of historical days that LFMT Collector will attempt to collect log files. This value
should less than or equal to the value of the LFMT Indexer retention_period option.
collection_timeout_mins
Default Value: 2
Valid Values: Any positive integer
Changes Take Effect: After restart of LFMT Collector.
This option controls the length of time in minutes for which a transfer should be cancelled if the global collection
request has not fully completed. For example, if 5 applications are selected in a collection request (scheduled or
manual), the logs from all 5 of these applications must be fully transferred to the LFMT host before this time-out
period elapses.
file_transfer_timeout
Default Value: 5
Valid Values: Any positive integer
Changes Take Effect: After restart of LFMT Collector.
This option controls when the connection between the collector and the workbench agent is terminated because of
timeout conditions. If terminated prematurely, the transfer of files from agent(s) will be terminated and not all files
may be transferred.
max_disk_utilization
Default Value: 85
Valid Values: Any positive integer
Changes Take Effect: After restart of LFMT Collector.
Specifies the maximum percentage of HDD space that will be utilized for storing log files in the CLS. The default
value 85 indicates that, up to 85% of the HDD space will be used. After reaching this threshold, further transfers will
not be executed.
package_location
Default Value: No default value
Valid Values: Valid path through the system (network)
Changes Take Effect: After restart of LFMT Collector.
Specifies the path through the system to the folder or directory where the LFMT Collector packages will be created.
package_retention
Default Value: 2
Valid Values: Any positive integer
Changes Take Effect: After restart of LFMT Collector.
Specifies the number days that LFMT Collector will keeps log file packages created from the LFMT Client before
deletion.
server_max_connections
Default Value: 1024
Valid Values: Any positive integer greater than 0.
Changes Take Effect: After restart of LFMT Collector.
Identifies the total number of connections allowed from all LFMT agents to transfer files.
tmp_folder_location
Default Value: OS temp folder (if no option configured)
Valid Values: Valid path through the system (network)
Changes Take Effect: After restart of LFMT Collector.
Specifies the path through the system to the folder or directory where the temporary files for LFMT are to be
located. For example, C:/GCTI/Collector_tmp.
log Section
This section contains all options relating to creating, viewing, and otherwise using the Centralized Log facility in
Genesys software.
all
Default value: No default value
Valid Values: [filename]
Changes Take Effect: After restart of LFMT Indexer.
Specifies the file location to which the application sends all log events.
expire
Default value: 10
Valid Values: [number] Specify a number from 1–1000.
Changes Take Effect: After restart of LFMT Indexer.
Determines how many log files are kept before they are deleted.
segment
Default value: 5000
Valid Values: [number] - Specify a value in kilobytes.
Changes Take Effect: After restart of LFMT Indexer.
verbose
Default value: all
Valid Values:
• debug - DEBUG, INFO, WARN, FATAL, and ERROR log events are printed.
• info - INFO, WARN, FATAL, and ERROR log events are printed.
security Section
This section contains all options relating to securing communication between the LFMT Collector and the
Workbench Agent. The section is optional and is required only if the communication between the Workbench and
the LFMT Collector has to be secured. This section must be called security.
mutual_tls
Default value: None
Valid Values: true,false
Changes Take Effect: After restart of LFMT Collector.
Indicates whether mutual TLS is enabled for messaging and file transfer.
provider
Default value: None
Valid Values: JKS,
Changes Take Effect: After restart of LFMT Collector.
The key provider.
protocol
Default value: None
Valid Values: TLSv1.2
Changes Take Effect: After restart of LFMT Collector.
Identifies the protocol to be used for the SSL communication between the LFMT Collector and the LFMT Agent.
enabled_ciphers
Default value: None
Valid Values: TLS_RSA_WITH_AES_128_CBC_SHA
Changes Take Effect: After restart of LFMT Collector.
Identifies the cipher suite to be used for TLS communication between the LFMT Collector and LFMT Agent.
security.keystore Section
The security.keystore section of the LFMT Collector application options is used to identify the keystore properties
through which LFMT Collector will load the necessary keys for secure communications.
This section must be called security.keystore.
path
Default value: No default value
Valid Values: A file path to the keystore located on the host. Note: The security certificates must be generated
using the SHA-2 secure hash algorithm.
Changes Take Effect: After restart of LFMT Collector.
Identifies the path to the local keystore to be used by LFMT Agent to load the necessary keys.
password
Default value: No default value
Valid Values: A valid password associated with the keystore defined in the path option of the security.keystore
section
Changes Take Effect: After restart of LFMT Collector.
The password to be used by LFMT Agent to access the keystore.
security.truststore Section
The security.truststore section of the LFMT Collector application options is used to identify the truststore properties
through which LFMT Collector will load the necessary certificates for secure communications.
This section must be called security.truststore.
path
Default value: No default value
Valid Values: A file path to the truststore located on the host. Note: The security certificates must be generated
using the SHA-2 secure hash algorithm.
Changes Take Effect: After restart of LFMT Collector.
Identifies the path to the truststore to be used by LFMT Collector to load the necessary certificates.
password
Default value: No default value
Valid Values: A valid password associated with the truststore identified in the path option of the security.truststore
section
Changes Take Effect: After restart of LFMT Collector.
The password to be used by LFMT Collector to access the truststore.
lfmt Section
The options in this section correspond to the DAP to which LFMT Client/Indexer/Collector will use to connect to an
LFMT Database.
site
Names the site where an LFMT Indexer/Collector pair resides. Used during configuration of LFMT in the Site
Configuration Tab of the LFMT Client.
use_oracle_service (optional)
Indicates that an Oracle database connection is to be made using a service name rather than an SID. The name of
the service is indicated by the “Database Name” property of the Database Access Point.
app_config Section
This section contains options for general configuration of the application. This section must be called app_config.
agent_max_open_requests
Default Value: 4096
Valid Values: Any positive integer greater than 0 and a power of 2. (i.e 1024, 2048, 4096 etc.)
Changes Take Effect: After restart of Workbench Agent.
Identifies the maximum number of open requests accepted into the connection pool of the workbench agent.
agent_max_outgoing_connections
Default Value: 4
Valid Values: Any positive integer greater than 0
Changes Take Effect: After restart of Workbench Agent.
Identifies the maximum number of concurrent outgoing connections from the workbench agent.
agent_max_pipelining_limit
Default Value: 1
Valid Values: Any positive integer greater than 0
Changes Take Effect: After restart of Workbench Agent.
Identifies the maximum number of requests that are accepted (and dispatched to the collector) on one single
connection before the first request is completed.
security Section
This section contains all options relating to securing communication between the LFMT Collector and the
Workbench Agent. The section is optional and is required only if the communication between the LFMT Collector
and the Workbench Agent has to be secured. This section must be called security.
mutual_tls
Default value: None
Valid Values: true,false
Changes Take Effect: After restart of Workbench Agent.
Indicates whether mutual TLS is enabled for messaging and file transfer.
provider
Default value: None
Valid Values: JKS
Changes Take Effect: After restart of Workbench Agent.
The key provider.
protocol
Default value: None
Valid Values: TLSv1.2
Changes Take Effect: After restart of Workbench Agent.
Identifies the protocol to be used for the SSL communication between the LFMT Collector and the Workbench
Agent.
enabled_ciphers
Default value: None
Valid Values: TLS_RSA_WITH_AES_128_CBC_SHA
Changes Take Effect: After restart of Workbench Agent.
Identifies the cipher to be used for SSL communication between the LFMT Collector and Workbench Agent.
security.keystore Section
The security.keystore section of the Workbench Agent application options is used to identify the keystore properties
through which Workbench Agent will load the necessary keys for secure communications. This section must be
called security.keystore.
path
Default value: No default value
Valid Values: A file path to the keystore located on the host
Changes Take Effect: After restart of Workbench Agent.
Identifies the path to the local keystore to be used by Workbench Agent to load the necessary keys.
password
Default value: No default value
Valid Values: A valid password associated with the keystore defined in the path option of the security.keystore
section
Changes Take Effect: After restart of Workbench Agent.
The password to be used by Workbench Agent to access the keystore.
security.truststore Section
The security.truststore section of the Workbench Agent application options is used to identify the truststore
properties through which Workbench Agent will load the necessary certificates for secure communications. This
section must be called security.truststore.
path
Default value: No default value
Valid Values: A file path to the truststore located on the host
Changes Take Effect: After restart of Workbench Agent.
Identifies the path to the truststore to be used by Workbench Agent to load the necessary certificates.
password
Default value: No default value
Valid Values: A valid password associated with the truststore identified in the path option of the security.truststore
section
Changes Take Effect: After restart of Workbench Agent.
The password to be used by Workbench Agent to access the truststore.
log Section
This section contains all options relating to creating, viewing, and otherwise using the Centralized Log facility in
Genesys software. This section must be called log.
all
Default value: No default value
Valid Values: [filename]
Changes Take Effect: After restart of Workbench Agent.
Specifies the file location to which the application sends all log events.
expire
Default value: 10
Valid Values: [number] Specify a number from 1–1000.
Changes Take Effect: After restart of Workbench Agent.
Determines how many log files are kept before they are deleted.
segment
Default value: 5000
Valid Values: [number] - Specify a value in kilobytes.
Changes Take Effect: After restart of Workbench Agent.
Determines the rollover size of the log files.
verbose
Default value: all
Valid Values:
• info - INFO, WARN, FATAL, and ERROR log events are printed.
lfmt Section
This section must be called lfmt.
nic (optional)
This option is configured on the Host object where the Workbench Agent is located. If the Host has a secondary
NIC dedicated for transfer of log files from the Host (using the Workbench Agent), the user can specify the same
here through this value.
Access to the LFMT Client will be available on both the main page and in the upper toolbar. The feature access will
be dictated by the role defined for the user of LFMT. To set the role of a given user, please see the Configuration of
Access Control for LFMT Users section.
4. Click Import Metadata to import the metadata for the LFMT client application template.
6. Select the lfmt-gax-template-metadata.xml file and click Open. The file is uploaded.
9. Click New and add a name for this role, such as LFMTTest.
10. Select the Role Privileges tab. In the Add/Remove Product section, scroll to the entry for the current Genesys
Administrator Extension – LFMT Plug-in release (such as Genesys Administrator Extension – LFMT Plug-in
8.1.3000.00) and select it. A new section called “Genensys Administrator Extension – LFMT Plug-in ” is added.
The following role privileges can be allowed/denied for the role configuration:
* Collection schedules
* Site configuration
2. In the Roles tab, select the LFMTTest role and click Edit.
3. In the Configuration tab, expand the Members section and click Add, to add this LFMTTest role to the desired user
profiles.
4. In the list of user names, select one or more users and click Ok.
5. The selected users will be displayed in the Members list as enabled for this LFMTTest role.
6. Click Save in the top menu to save the member assignments to this role.
4. Click New and add a name for this role, such as LFMTTest.
The following role privileges can be allowed/denied for the role configuration:
* Collection schedules
* Site configuration
2. Go to Role Members section and add the users that are going to have the LFMTTest role
Site Configuration
This section describes how to associate a specific group of hosts or application to a Site. For each Site, a separate
LFMT Indexer/Collector must exist. It is recommended that all Site hosts/applications reside in the same
geographical location.
3. Select the checkboxes beside the hosts/applications you would like to assign to the Site.
If a host or application does not appear in the Site Configuration list, ensure the following requirements are
met:
• The missing application has the [log] section configured with the option all in its configuration.
• The user logged into GAX has READ permissions on the missing host/application.
Important
Only hosts/applications assigned to a site appear for lists in other LFMT Client sections.
Collection Schedules
This section describes to configure log file collection schedules for LFMT Collector.
2. Click the button in the Collection Schedules pane. The New Collection Schedule pane will
appear.
3. Select the desired applications for the new LFMT Collector schedule.
4. Provide the name, start time, time zone, collector interval (in minutes), and exception time for the new LFMT Collector
schedule.
2. Click on the text of the LFMT Collector schedule in the Collection Schedules pane. The Edit Collection
Schedule pane will appear.
3. Add/remove the desired applications from the LFMT Collector schedule as desired.
4. Edit the name, start time, time zone, collector interval (in minutes), and exception time for the LFMT Collector schedule
as desired.
2. Select the checkbox associated with the LFMT Collector schedule in the Collection Schedules pane.
1. To enable the LFMT Collector schedule, select the checkbox associated with schedule, and click the
button.
2. To disable the LFMT Collector schedule, select the checkbox associated with schedule, and click the
button.
Force Collection
This section describes how to initiate a real-time log file collection by LFMT Collector.
2. Select the hosts/applications for which the log files are to be collected.
Important
Genesys recommends that users be aware of the possible network bandwidth consumption when
using the Force Collection method of updating the CLS.
Important
If a regular expression exists for multiple sites with the same Name, Type, and Expression, it
will appear as one entry in the Indexing and Scrubbing table.
2. Select the Add button to create a new regular expression. The Add Regular Expression panel will appear.
3. In the Add Regular Expression panel provide the Name and Regular Expression in the provided text fields.
4. Choose whether the new regular expression will by used for indexing or scrubbing using the Type radio buttons.
5. Choose the site for which the new regular expression will apply from the Site drop-down box.
6. Check the application types and/or applications to which the new regular expression will apply from the provided list.
2. Double-click on the regular expression Name in the Indexing and Scrubbing table. The Edit Regular
Expression panel will appear.
3. In the Edit Regular Expression panel change the Regular Expression, Type, and Site as desired.
4. Change the application types and/or applications to which the regular expression will apply from the provided list.
2. Select the checkbox beside the regular expression in the Indexing and Scrubbing table.
Tip
The ILIKE option allows users to search with SQL type wildcards.
Important
It is possible to search using multiple custom-defined indexes by selecting the AND or OR radio
button options.
3. Once the query is built, click Select Applications. The Select Applications pane becomes visible.
4. Select the desired applications from the Select Applications pane for which to apply the query.
5. Select the Search button to run the query against the selected applications. The Filtered Log Files will become
visible. Log files from the applications matching the query will be displayed in this pane.
6. Select the desired log files from the Filtered Log Files pane.
7. Click the Build Package button to generate the package build request.
8. After a package has been built, a dialog will appear with a quick-link to the Available Packages section. Download
and FTP(S)/SFTP of log file packages are available in the Available Packages section.
Available Packages
This section describes how to download and send LFMT packages built in the Log File Packaging section.
Tip
• LFMT packages have the .zip extension as of 8.5.104 release.
• If preferred, LFMT Packages can be generated with an .lfm extension instead by setting
use_lfm_extension option to true.
• The package (.zip or .lfm extension ) is a compressed file and can be extracted by applications
such as WinRAR, 7-Zip, etc.
• To view the contents of a package, double-click on the package name. The Package Contents dialog box will
appear including the filename for the package and the filter criteria used to generate the package.
5. Click the hyperlink associated with the package(s) to start the download.
Important
Information about the package
Inside every LFMT package, a details.txt file is included that contains filter information about the package generation.
4. Click the Send FTP(S)/SFTP button. The FTP(S)/SFTP dialog will appear.
5. Enter the IP, port, username, and password for connection to the FTP(S)/SFTP server.
The LFMT Audit logging can be turned on by setting a new key-value-pair in the "log" options section for the GAX
application:
The above setting will cause new auditing entries to be written to the GAX logs. These new entries will be written
during the add, change or delete operation on the tables of the database used by LFMT. When needed, extract
these lines from the GAX log(s) that have LFMT_Audit, Log in user or logged out in it.
Important
Please note that the records for addition, deletion and change are JSON records and can be
processed using any standard JSON parser. Each of these JSON records also contains the key
complete_record that represents the record from the Database.
Example
Utilizing the grep command (on *nix or UnxUtils on Windows) to extract those entries from the log file
gax20180914_153236_788.log into an output text file lfmt_audit_log.txt.
This file may contain five different types of audit logs as follows:
Type - 1
Log in: This line is written to the logs when a user logs in.
This line shows that the user default logged in at 2018-09-14 15:32:46,710.
This line shows that the user ndatar logged in at 2018-09-14 15:32:46,710.
Type - 2:
Log out: This line is written to the logs when a user logs out.
This line shows that the user default logged out at 2018-09-14 15:40:48,617.
This line shows that the user ndatar logged out at 2018-09-14 15:48:07,165.
Type - 3:
Added Record: This line is written to the logs when a new record is added.
This line shows that a new record was added (mode : Added) to the table IndexToRegex at Fri Sep 14 15:33:28
ADT 2018 by the user default.
This line shows that a new record was added (mode : Added) to the table IndexToRegex at Fri Sep 14 15:47:39
ADT 2018 by the user ndatar.
Type - 4:
Changed Record: This line is written to the logs when the contents of an existing record is changed.
This line shows that the entry with name asd was changed (mode : Changed) in the table IndexToRegex at Fri
Sep 14 15:36:39 ADT 2018 by the user default.
This line shows that the entry with name asd was changed (mode : Changed) in the table IndexToRegex at Fri
Sep 14 15:47:51 ADT 2018 by the user ndatar.
Type - 5:
Deleted Record: This line is written to the logs when an existing record content is deleted.
This line shows that the entry with name ggh from the table IndexToRegex was deleted (mode : Deleted) at Fri
Sep 14 15:46:30 ADT 2018 by the user default.
This line shows that the entry with name for_testing from the table IndexToRegex was deleted (mode : Deleted) at
Fri Sep 14 15:48:01 ADT 2018 by the user ndatar.
Additional Information
This section gives additional information to administrators and users for deploying, configuring, and using the LFMT.
Important
When creating certificates using OpenSSL as described in the Genesys Security Deployment
Guide ensure the default Secure Hash Algorithm is at minimum SHA-2. This can be done by
editing the .\ca_conf\ca.conf file created by the create_ca.sh script so default_md =
sha256 prior to creating certificates.
Important
If LFMT Indexer and LFMT Collector are to be deployed on a Linux host, ensure the private key is
in PKCS #8 format. For more information on converting keys to PKCS #8 for use with Java based
Genesys PSDK applications, refer to the Genesys Security Deployment Guide.
On Linux
1. If not already completed, install the Genesys Security on UNIX package and configure the system environment
variable LD_LIBRARY_PATH as per the Genesys Security Deployment Guide.
2. Copy the certificate, the certificate key, and the certificate authority file to a location on the LFMT Server Host.
3. Ensure the certificate, the certificate key, and the certificate authority file are readable by the user that starts LFMT
Indexer and LFMT Collector.
On Windows
1. Copy the certificate, the certificate key, and the certificate authority file to a location on the LFMT Server Host.
2. Ensure the certificate, the certificate key, and the certificate authority file are readable by the user that starts LFMT
Indexer and LFMT Collector.
3. From the Windows Start menu, select Run, and then execute the mmc command to start the Microsoft Management
Console (MMC).
• The Microsoft Management Console should be opened under the user who starts LFMT Indexer and LFMT Collector.
If this is the Local System account, you will need to open the console as the Local System user. This can be done
using the PSTools psexec application with the following command:
psexec.exe –i –s mmc.exe
• In the Computer Account snap-in right-click the Trusted Root Certification Authorities folder, and select All Tasks > Import
from the shortcut menu. This starts the Certificate Import Wizard.
• On the File to Import page, browse to the certificate authority file (Ex. ca_cert.pem), and then click Next.
• On the Certificate Store page, select Place all certificates in the following store. Make sure that the Certificate store text box
is set to Trusted Root Certification Authorities. Click Next.
• Click Finish.
• Right-click the Personal folder, and select All Tasks > Import from the shortcut menu. This starts the Certificate Import
Wizard.
• On the File to Import page, browse to the certificate file (Ex. collector_host.pfx). Click Next.
• On the Certificate Store page, select Place all certificates in the following store. Make sure that the Certificate store text box
is set to Personal. Click Next.
• Click Finish.
• On the right pane, locate the imported certificate in the list, and double-click it.
• To view the certificate thumbprint, select Thumbprint from the list. The thumbprint, consisting of a string of hexadecimal
digits, appears in the lower part of the dialog box. The same process can be used to view the thumbprint for the certificate
authority.
3. In the Applications section, locate and open the LFMT Indexer/Collector application.
4. In the General tab, specify the Auto-Detect port of the primary and backup Configuration Server for the port and
backupport arguments in the Command Line Arguments respectively.
5. In the Connections tab, select Add. Add a connection to the primary Configuration Server being sure to select the
Auto-Detect port in the Port ID drop-down.
6. In the Connections tab, select Add. Add a connection to the backup Configuration Server being sure to select the
Auto-Detect port in the Port ID drop-down.
7. In the General tab, specify the Certificate, Certificate Key, and the Trusted CA installed on the LFMT
Server Host.
• Certificate: For Windows this will be the thumbprint of the certificate shown in the Properties of the certificate
in MMC Certificates snap-in. For Linux, this will be the complete path to the certificate file. Ex. /home/genesys/
certs/collector_host.pem
• Certificate Key: For Windows this will be the thumbprint of the certificate shown in the Properties of the
certificate in MMC Certificates snap-in (this normally the same value as used in the Certificate field). For
Linux, this will be the complete path to the certificate key file. Ex. /home/genesys/certs/
collector_host_java_priv_key.pem
• Trusted CA: For Windows this will be the thumbprint of the Trusted Root Certificate Authority shown in the
Properties of the certificate authority in MMC Certificates snap-in. For Linux, this will be the complete path to the
certificate authority file. Ex. /home/genesys/certs/ca_cert.pem
Tip
As an alternative to configuring the Certificate, Certificate Key, and the Trusted CA for
the LFMT Indexer and Collector at the application level, certificates and certificate authorities can
be assigned on the LFMT Server Host Object in GAX.
Best Practices
This section lists some best practices administrators and users should review for optimal deployment, configuration,
and operation of LFMT.
• Deploy a separate LFMT Indexer/Collector pair at each datacenter if they are geographically distributed.
• Deploy each LFMT Database in a DBMS within the same local as the associated LFMT Indexer/Collector pair.
• During the initial deployment of LFMT, consider a phased approach for adding application servers to the log collection
process.
• Monitor the performance impact of LFMT on each application server during the initial deployment.
• To reduce the performance impact of log file collection set the collection interval to be twice the required log file
transfer time.
• Limit the custom indexes for each application/application type. A general rule is 3 per application.
• Set up scrubbing and indexing for only those application types that are required.
• Ensure that network traffic generated by Genesys application servers has a higher priority LFMT traffic.
• Set a low quality of service (QoS) value for network traffic generated by LFMT.
Regular Expressions
This section describes how to create regular expressions used for custom indexes by LFMT Indexer and/or
sensitive data scrubbing by LFMT Collector.
Important
Genesys strongly recommends that you test the regular expressions that you want to use for
indexing and scrubbing before you define them in the LFMT Client.
1. \t - A tab character.
3. \t - A tab character.
• The text matched inside the group will be that which is indexed in the database, or scrubbed from the file.
• Applying the expression above to the following application log file as an index.
Tip
Tools like Regex Coach (http://www.weitz.de/regex-coach/) can be used to test the syntax of the
regular expressions.
Release Notes
This section provides links to the LFMT Release Notes.