on
16 Apr 2024
10:49 AM
- edited on
19 Aug 2025
12:43 PM
by
HannahM
Log ingestion is the process of collecting log data from various sources within an infrastructure. These logs can then be analyzed for many purposes within Dynatrace.
This article provides troubleshooting steps for when logs are not ingested/ visible in Dynatrace.
--get-app-log-content-access
parameter to check whether Log Monitoring is enabled:./oneagentctl --get-app-log-content-access
Windows:
.\oneagentctl.exe --get-app-log-content-access
[2024-11-28 10:11:29.463 UTC] [/rework/logprocessing/filelogsource.cpp] [info] LGI: / /logs/appl/conc/out/*.txt doesn't meet security rules. (This message was ignored 14 times
You can fix this by creating override rules.
Check if OneAgent has access to the file.
It might especially happen when a file is on an NFS drive on Linux. Then you need to ensure that the user account OneAgent is running on has access to the file, and also enable NFS drive log detection, Settings > Log Monitoring > Advanced log settings.
You can run the below command and check if it's accessible.
sudo -u dtuser ls -l /path/to/logfile
sudo -u dtuser cat /path/to/logfile
kubectl get pods -n dynatrace
You should see a pod named "logmonitoring" running if it's running correctly.The containerd, CRI-O, or cri-dockerd container runtime is used.
Logs are written to the container's stdout/stderr stream.
See Syslog Ingestion via ActiveGate Troubleshooting Guide
See Troubleshooting logs ingested via Fluent Bit
If this article didn't help, please open a support ticket, mention that this article was used, and provide the following:
Hello @noel_david
Thank you for summarizing the troubleshooting points.
What could be the potential issue of no Auto-discovery of Kubernetes/OpenShift logs?
Regards,
Babar
Hi @Babar_Qayyum ,
In general,
Hello @noel_david
The log ingested rule is applied on the namespaces level, and also these are important processes.
Regards,
Babar
Hello @noel_david
I just wanted to update you that log monitoring was not enabled on the global level.
Regards,
Babar
Hi @noel_david ,
Thanks a lot for your great post.
I think we can add another use case in "Improper ingest rules" point:
In this case the log will not visible in Dynatrace either.
Thanks,
Elena.
Hi @erh_inetum , Thank you .
Can you please share an example here, if possible,
Hi @noel_david ,
Here an example: for this kind of rules
we have seen that if the process group doesn´t have deployed services
the log isn´t captured. But it is in case the process group has deployed services.
Please, let me know in case my explanation is not clear and it try to explain it better again.
Thanks you so much.
Regards,
Elena.
Hi @erh_inetum ,
I tried to reproduce the issue but was unsuccessful; if you can share a sample, it will be unique. Can you share me if you have one? A support ticket will be perfect.
Hi @noel_david ,
The screenshots that I put in my comment below are the issue we had and how to reproduce it.
We haven't opened a ticket because we configures the rule for an specific host and we got the log.
Let me know if this information os enough.
Thanks so much.
Regards,
Elena
For this point:
There is now a built-in log ingest rule that you can enable that will ingest all logs from custom log sources. Just enable that rule and you don't have to worry about making multiple rules.