ESET Online Help

Search English
Select the topic

Collect logs

If ESET Technical Support requests logs from ESET Endpoint Antivirus for Linux, use the collect_logs.sh script available at /opt/eset/eea/sbin/ to generate the logs.

Launch the script from a terminal window with root privileges. For example, in Ubuntu, run the following command:

sudo /opt/eset/eea/sbin/collect_logs.sh

The script generates all essential logs as an archive file to the home folder of being logged-in user, and it will display the path to it. It also collects activation logs if available. Send that file to ESET Technical Support via email.

Activation logs

To help you troubleshoot product activation issues, related logs might be requested by ESET Technical Support.

1.Enable activation log service by executing the following command as a privileged user:

sudo /opt/eset/eea/sbin/ecp_logging.sh -e

alternatively

sudo /opt/eset/eea/sbin/ecp_logging.sh -e -f

to restart the product if essential without any prompt.

2.Try the activation process again. If it fails, run the log collecting script as a privileged user:

sudo /opt/eset/eea/sbin/collect_logs.sh

3.Send the collected logs to ESET Technical Support.

4.Disable activation logs by executing the following command as a privileged user:

sudo /opt/eset/eea/sbin/ecp_logging.sh -d

alternatively

sudo /opt/eset/eea/sbin/ecp_logging.sh -d -f

to restart the product if essential without any prompt.

Installation logs

To help you troubleshoot product installation issues, you might be requested by ESET Technical Support to send in related logs and information.

1.Copy the complete output from the terminal of the running installer.

2.To copy exact information about the version of the operating system and distribution, execute the following command from a Terminal window as a privileged user:

lsb_release -a

alternatively

hostnamectl

3.To copy exact information about the kernel, execute the following command from a Terminal window as a privileged user:

dmesg | grep Linux

alternatively

yum list kernel-*

4.To copy exact information about the hardware, execute the following command from a Terminal window as a privileged user:

lshw

5.Collect log files using the info_get.command.