Product SiteDocumentation Site

22.1. Events

22.1.1. Event Logs

There are two types of events logged in the CloudStack Event Log. Standard events log the success or failure of an event and can be used to identify jobs or processes that have failed. There are also long running job events. Events for asynchronous jobs log when a job is scheduled, when it starts, and when it completes. Other long running synchronous jobs log when a job starts, and when it completes. Long running synchronous and asynchronous event logs can be used to gain more information on the status of a pending job or can be used to identify a job that is hanging or has not started. The following sections provide more information on these events..

22.1.2. Standard Events

The events log records three types of standard events.
  • INFO. This event is generated when an operation has been successfully performed.
  • WARN. This event is generated in the following circumstances.
    • When a network is disconnected while monitoring a template download.
    • When a template download is abandoned.
    • When an issue on the storage server causes the volumes to fail over to the mirror storage server.
  • ERROR. This event is generated when an operation has not been successfully performed

22.1.3. Long Running Job Events

The events log records three types of standard events.
  • INFO. This event is generated when an operation has been successfully performed.
  • WARN. This event is generated in the following circumstances.
    • When a network is disconnected while monitoring a template download.
    • When a template download is abandoned.
    • When an issue on the storage server causes the volumes to fail over to the mirror storage server.
  • ERROR. This event is generated when an operation has not been successfully performed

22.1.4. Event Log Queries

Database logs can be queried from the user interface. The list of events captured by the system includes:
  • Virtual machine creation, deletion, and on-going management operations
  • Virtual router creation, deletion, and on-going management operations
  • Template creation and deletion
  • Network/load balancer rules creation and deletion
  • Storage volume creation and deletion
  • User login and logout