On Windows operating systems, use Microsoft Event Viewer to view the messages written to the Operating System Event Log. PowerChute Logs are displayed under Windows Logs > Application. In the Source field, the “PowerChute” value is provided for PowerChute events.
|
|
The PowerChute service will not start if the configuration files are missing, or the service is prevented from accessing the files due to permissions. |
The following image shows an example of a service start error:

On Linux operating systems, service logs are written to the system journal. To review all the service events related to PowerChute, use the following command:
journalctl -u PowerChute.service
To review the most recent service action, use the following command as an alternative:
systemctl status PowerChute
The service indicates an “inactive (dead)” status, when the service has stopped, and the context provides additional information about why the service has ended. Additional logs in error.log file will display information on unexpected service halts.

Error conditions that are significant to operators but do not cause the service to stop are logged in the error.log file. Examples include network conditions preventing connection to VCenter, controller VMs, cluster hosts, and other collaborating systems. Operators are advised to review logs periodically to ensure PowerChute configuration and network conditions enable PowerChute to react to UPS events.
PowerChute manages logging through Log4J. This is configured by the configuration file log4j2.xml in the installation directory.
On Windows installations, the Event Log records the below events. You can view these events with Windows Event Viewer in the Application Log.
PowerChute uses Log4J SyslogAppender to direct logs to an appropriately configured syslog server.
The following configuration is provided in the log4j2.xml file, in the installation directory.
<Syslog name=”syslog” format=”RFC5424” host=”localhost” port=”514” protocol=”UDP” appName=”PowerChute” facility=”ALERT” enterpriseNumber=”1.3.6.1.4.1.318” messageId=”PowerChute”/>
This configuration will forward log events to a syslog server over UDP to port 514. This transport mechanism is considered insecure because data on the network is not encrypted, and the network endpoints do not mutually authenticate each other. This configuration is not recommended for production deployments.
PowerChute uses Log4J SyslogAppender to direct logs to an appropriately configured syslog server.
The following configuration is provided in the log4j2.xml file, in the installation directory.
<Syslog name="syslog_sec" format="RFC5424" host="localhost" port="6541" protocol="TLS" appName="PowerChute" facility="ALERT" enterpriseNumber="1.3.6.1.4.1.318" messageId="PowerChute">
<SSL>
<KeyStore location=”/path/to/syslog_keystore.jks”
type=”PKCS12” password=”apassword” />
<TrustStore location="/path/to/syslog_truststore.jks"
type="PKCS12" password="apassword" />
<SSL>
</Syslog>
This transport mechanism is considered secure because the data transported over the network is protected by TLS, and network endpoints can mutually authenticate each other.
The PowerChute KeyStore contains a certificate which is presented to the server to establish trust in the connecting client. The client certificate should be countersigned by your trusted Certificate Authority. The TrustStore file contains the syslog server certificate from the Certificate Authority and enables PowerChute to authenticate the server’s certificate. For information on the passwords required for the KeyStore and the TrustStore, see Log4J SSL configuration manual.
keytool -keystore syslog_keystore.jks -genkey -keysize 4096 -keyalg RSA -alias client
keytool -certreq -alias client -file client.csr -keystore syslog_keystore.jks
keytool -keystore syslog_keystore.jks -import -file rootCA.crt - alias root-ca
keytool -keystore syslog_keystore.jks -import -file client.crt - alias client
keytool -keystore syslog_truststore.jks -genkey -alias deleteme
keytool -keystore syslog_truststore.jks -delete -alias deleteme
Keytool -keystore syslog_truststore.jks -import -file
/path/to/rootCA.crt -alias syslog-ca