I ran sosreport '3.6-1ubuntu0.18.10.1' inside a baremetal AND a container without any issue.
The test was run with '-a, --alloptions'[1] AND '--all-logs'[2]
[1] - Boolean that set to True for all enabled plugins.
[2] - Tell sosreport to collect all possible log data ignoring any size limits.
Report:
* All the mandatory directory and files (mention in the autopkgtest are present) has been collected and contain valid data.
* All 0 size files found in the tarball are related to thing which doesn't raise any red flag to me. For instance the network or wireless plugin still tries to run network command iwconfig,
ifenslave, even if not installed by default w/ Bionic.
This command will collect system configuration and diagnostic
information from this Ubuntu system. An archive containing the collected
information will be generated in /tmp/sos.sib3fe4u.
The generated archive may contain data considered sensitive and its
content should be reviewed by the originating organization before being
passed to any third party.
No changes will be made to system configuration.
Press ENTER to continue, or CTRL-C to quit.
Please enter the case id that you are generating this report for []:
Setting up archive ...
Setting up plugins ...
Running plugins. Please wait ...
[VERIFICATION COSMIC]
I ran sosreport '3.6-1ubuntu0. 18.10.1' inside a baremetal AND a container without any issue.
The test was run with '-a, --alloptions'[1] AND '--all-logs'[2]
[1] - Boolean that set to True for all enabled plugins.
[2] - Tell sosreport to collect all possible log data ignoring any size limits.
Report:
* All the mandatory directory and files (mention in the autopkgtest are present) has been collected and contain valid data.
* All 0 size files found in the tarball are related to thing which doesn't raise any red flag to me. For instance the network or wireless plugin still tries to run network command iwconfig,
ifenslave, even if not installed by default w/ Bionic.
0 ./sos_commands/ wireless/ iwconfig networking/ ifenslave_ -a
0 ./sos_commands/
* Sensible data substitution works as expected:
etc/ssl/ openssl. cnf:# input_password = ****** openssl. cnf:# output_password = ****** openssl. cnf:challengePa ssword = ****** openssl. cnf:challengePa ssword_ min = ****** openssl. cnf:challengePa ssword_ max = ******
etc/ssl/
etc/ssl/
etc/ssl/
etc/ssl/
Output:
sosreport -a --all-logs
sosreport (version 3.6)
This command will collect system configuration and diagnostic
information from this Ubuntu system. An archive containing the collected
information will be generated in /tmp/sos.sib3fe4u.
For more information on Ubuntu visit:
http:// www.ubuntu. com/
The generated archive may contain data considered sensitive and its
content should be reviewed by the originating organization before being
passed to any third party.
No changes will be made to system configuration.
Press ENTER to continue, or CTRL-C to quit.
Please enter the case id that you are generating this report for []:
Setting up archive ...
Setting up plugins ...
Running plugins. Please wait ...
Starting 8/55 btrfs [Running: apparmor apt block btrfs]
Finishing plugins [Running: systemd]
Finished running plugins
Creating compressed archive...
Your sosreport has been generated and saved in: sosreport- ubuntu- 20181115215323. tar.xz
/tmp/
The checksum is: 7055bd410bb1183 0fc631f06371e3d be
Please send this file to your support representative.