4.0 KiB
title | description | lead | date | draft | images | menu | weight | toc | aliases | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Troubleshooting | This guide describes and helps users provide information during troubleshooting including sanitization etc | This guide describes and helps users provide troubleshooting information. | 2023-05-01T11:30:07+10:00 | false |
|
220 | true |
|
Frequently Asked Questions
See the Frequently Asked Questions reference guide for links to frequently asked question documentation.
Logs
It's really important when troubleshooting and even more important when reporting a bug that users provide complete
log files. In addition the log level should always be set to
debug
at minimum, if not trace
.
Complete logs means at minimum from the log severity line until the actual issue occurs. Though more than this may be included at the users discretion.
Large Amount of Logs
In instances where the logs are substantial we will accept truncated logs. There are however some very intentional rules about truncation of logs.
- You must show more than 1 minute of logs prior to the issue occurring (i.e. show every log line )
- The level rule still applies.
- You must show:
- The log severity line.
- The listening line and the 10 log lines which follow this line.
- The lines between these two lines, which should also include the starting line.
- No warning or error that is potentially related to the issue should be truncated.
Important Log Lines
The following log lines are important and are referenced by other sections of this document.
Log Severity Line
The log severity line will have a message which is similar to the following examples:
Log severity set to debug
Log severity set to trace
Starting Line
The starting line will have a message which is similar to the following examples:
Authelia v4.37.5 is starting
Authelia v4.38.0 is starting
Authelia untagged-v4.38.0 (master, 50d8b4a) is starting
Listening Line
The listening line will have a message which is similar to the following examples:
Listening for non-TLS connections on '0.0.0.0:9091' path '/'
Listening for TLS connections on '0.0.0.0:9091' path '/'
Listening for non-TLS connections on ':9091' path '/'
Listening for non-TLS connections on ':9091' path '/' and '/authelia'
Sanitization
Some users may wish to hide their domain in files provided during troubleshooting. While this is discouraged, if a user decides to perform this action it's critical for these purposes that you hide your domain in a very specific way. Most editors allow replacing all instances of a value, utilizing this is essential to making troubleshooting possible.
General Rules
- Only replace the purchased portion of domains:
- For example if you have
auth.abc123.com
andapp.abc123.com
they should becomeauth.example.com
andapp.example.com
, i.e. replace all instances ofabc123.com
withexample.com
.
- For example if you have
- Make sure value replaced is replaced with a unique value:
- For example if you replace
abc123.com
withexample.com
DO NOT replace any other value other thanabc123.com
withexample.com
. The same rule applies to IP addresses, usernames, and groups.
- For example if you replace
- Make sure the value replaced is replaced across logs, configuration, and any references:
- For example if you replace
abc123.com
withexample.com
in your configuration, make exactly the same replacement for the log files.
- For example if you replace
- Make sure this consistency is followed for all communication regarding a single issue.
Multiple Domains
Replacement Value: example#.com
(where #
is a unique number per domain)
In instances where there are multiple domains it's recommended these domains are replaced with example1.com
,
example2.com
, etc.