Collect and sanitize Digital Lab logs
You can collect and sanitize Digital Lab server and connector logs. This section is relevant only for UFTDigital Lab.
You can run a script in the command line, to collect and sanitize Digital Lab server and connector logs. You can limit the size of logs, by selecting logs for a specific machine, or by selecting the latest logs only. This is useful because the log files may contain a large number of files. If you are only interested in a particular machine or time period, downloading specific logs makes it easier to identify the information that you are looking for. With the script, you can also mask sensitive information such as machine addresses or user names, and prevent this data from being included in the logs.
Run the script
Run the script in the Digital Lab server's bin folder. The parameters -output and -adminExecutionToken are required:
The following table includes script parameters:
|-output||The directory to which save the logs.|
|-adminExecutionToken||Execution access key of the Digital Lab admin user. For details on access keys, see Access key management.|
This is an example of running the script to collect the latest server and connector logs, masking all the data.
C:\Program Files\UFT Digital Lab Server\server\bin\log_sanitization.bat -output C:\MyLogs -adminExecutionToken "firstname.lastname@example.org; secret=***********; tenant=*******" -collectPeriod latest -dataToMask all