Create log file in windows

How to create a log using System Monitor in Windows

Summary

This article describes how to create log files using System Monitor in Microsoft Windows 2000, Microsoft Windows XP or Microsoft Windows Server 2003.

Download and use the Performance Monitor Wizard (PerfWiz) to make the log configuration process easier to set up.

More Information

The System Monitor tool included with Windows 2000, Windows XP and Windows Server 2003 is the administrative tool that replaces the Performance Monitor tool included with Windows NT 4.0.

Here is a list of some improvements in the System Monitor tool:

You can log specific counters and instances of an object, which helps you reduce the size of log files.

The Print Queue object is a new Performance object that allows you to monitor aspects of a print queue.

You can start the log on an event using Performance Logs and Alerts.

Other Performance objects have also been added.

A sample log file is included in Windows 2000.

To create a new log:

Right-click Counter Logs, click New Log Settings, type a name for the log, and then click OK.

On the General tab in Windows 2000,click Add to add the counters you want. On the General tab in Windows XP or Windows Server 2003, click Add Counters.

On the Log Files tab, click the logging options you want.

On the Schedule tab, click the scheduling options you want.

You can set similar options in Alerts. For example, you can configure the alert to send a message, start a performance data log, or run a program, if a counter exceeds a certain value.

Using Performance Monitor Wizard

To obtain and download the Performance Monitor Wizard (PerfWiz). The Performance Monitor Wizard simplifies the gathering of performance monitor logs. It configures the correct counters to collect sample intervals and log file sizes. This wizard can create logs for troubleshooting operating system or Exchange server performance issues.

If you are troubleshooting a performance issue or an issue that looks like a memory leak, the objects that Performance Monitor should log include but are not limited to the following items. Memory resource issues:

Cache
Memory
Objects
Paging file
Process
Processor
System
Terminal Services (if a Terminal Server) For all other resource issues, add additional counters:

Logical disk
NBT Connections
Network interface
Physical disk
Redirector
Server
Server work queues
Thread (do NOT capture if a terminal server)
All Terminal Server counters (if a Terminal Server)
All Protocol counters bound to network adapters

Physical Disk counters are present by default on Windows 2000.

For additional information about how to view log files for memory leaks and performance bottlenecks, click the following article number to view the article in the Microsoft Knowledge Base:

150934 How to create a Performance Monitor log for NT troubleshooting
Also see Determining acceptable values for counters under Performance counters in Windows 2000 Help.

Creating a Log File

Before you can use CLFS, you must create a log file using the CreateLogFile function. A log file is made up of a base log file that contains metadata, and a number of containers that hold the actual data. On any local file system, containers can be in one or more separate files; on NTFS, containers can be in one or more streams within a file.

Читайте также:  Создать папку консоль линукса

You can create containers using the AddLogContainer and AddLogContainerSet functions. You can also use the CLFS Management API to have CLFS create containers for you.

When you create containers, they are created using the same security attributes as the .blf file, and are created within the context of the user calling the AddLogContainer function, not the context of the owner of the .blf file. For more information about .blf files, see Log Types.

Log File Names

Log file names consist of the log name and an optional log stream name, depending on whether the log is dedicated or multiplexed. The following table enumerates the different ways you can specify a log file name.

Log file name Description
Log**: [:: ]** The basic format of a log file name, including both required and optional elements.
Corresponds to a valid file path on the underlying file system.
The unique name of a log stream in the log.

Reading the first «::» from left to right delimits the end of the log name and the start of the log stream name. For example, you can create a dedicated or multiplexed log if you specify the log names in the table above when calling the CreateLogFile function.

Dedicated logs are created by clients that specify only a log name in the pszLogFileName parameter of the CreateLogFile function. This function creates a base log file (.blf) on the path that is specified by the log name. The path can be either absolute or relative. For example, if you specify «log» as the value of pszLogFileName, the file name on the computer is «log.blf», but the name of the log for the application is «log».

When a log is created, CLFS determines whether the log is dedicated or multiplexed depending on whether a dedicated log path or a multiplexed log path is specified by the pszLogFileName parameter.

Multiplex Log Design Considerations

Logs can either be dedicated or multiplexed. Dedicated logs contain one stream, and can never contain more streams. Multiplexed logs have one or more streams. You can create more streams for a multiplexed log in the future.

«Pinning a log tail» means that one log stream does not move its tail, so that all other streams within the log operate normally, write records, and move their respective tails. Eventually, because containers cannot be recycled, the log fills up and no more records can be written. Your application must ensure that when it shares a log that it only does so to users, clients, and processes that are trusted. The ACL for the log file should only include those trusted entities. For example, only allow CompanyXAdmin accounts to have write permissions to the log. By registering as a managed client, an application is entered into an implied contract between all consumers of a log that each consumer is a well-behaved application, and will move their respective log tails when requested to do so.

Sample Code

The following example shows how to:

  1. Create a log file
  2. Create the initial containers
  3. Set the policy for container size
  4. Create containers according to the policy
  5. Set the policy for maximum container size

Windows Setup Log Files and Event Logs

Windows® Setup creates log files for all actions that occur during installation. If you are experiencing problems installing Windows, consult the log files to troubleshoot the installation.

WindowsВ Setup log files are available in the following directories:

Log location before Setup can access the drive.

Log location when Setup rolls back in the event of a fatal error.

Log location of Setup actions after disk configuration.

Used to log Plug and Play device installations.

Location of memory dump from bug checks.

Location of log minidumps from bug checks.

Location of Sysprep logs.

WindowsВ Setup Event Logs

WindowsВ Setup includes the ability to review the WindowsВ Setup performance events in the Windows Event Log viewer. This enables you to more easily review the actions that occurred during WindowsВ Setup and to review the performance statistics for different parts of WindowsВ Setup. You can filter the log so as to view only relevant items that you are interested in. The WindowsВ Setup performance events are saved into a log file that is named Setup.etl, which is available in the %WINDIR%\Panther directory of all installations. To view the logs, you must use the Event Viewer included with the Windows media that corresponds to the version of the customized image that you are building.

To view the logs on a computer that does not include the corresponding kit, you must run a script from the root of the media that installs the Event Trace for Windows (ETW) provider. From the command line, type:

where D is the drive letter of the Windows DVD media.

To view the WindowsВ Setup event logs

Start the Event Viewer, expand the Windows Logs node, and then click System.

In the Actions pane, click Open Saved Log and then locate the Setup.etl file. By default, this file is available in the %WINDIR%\Panther directory.

The log file contents appear in the Event Viewer.

To Export the log to a file

From the command line, use the Wevtutil or Tracerpt commands to save the log to an .xml or text file. For information about how to use these tools, see the command-line Help. The following commands show examples of how to use the tools:

Windows Vista, Windows 7, Windows Server 2008 R2, Windows 8.1, and Windows 10 setup log file locations

This article describes where to locate these log files and which log files are most useful for troubleshooting each setup phase of Windows 7, of Windows Server 2008 R2, and of Windows Vista.

Original product version: В Windows 10 — all editions, Windows Server 2019, Windows Server 2016
Original KB number: В 927521

Introduction

Windows setup log files are in different locations on the hard disk. These locations depend on the setup phase.

Support for Windows Vista without any service packs installed ended on April 13, 2010. To continue receiving security updates for Windows, make sure you’re running Windows Vista with Service Pack 2 (SP2). For more information, see Windows XP support has ended.

Down-level phase

The downlevel phase is the Windows setup phase that is running within the previous operating system. The following table lists important log files in this setup phase.

Log file location Description
Log file Description
C:\WINDOWS\setupapi.log Contains information about device changes, driver changes, and major system changes, such as service pack installations and hotfix installations.

This log file is used only by Microsoft Windows XP and earlier versions.

C:$WINDOWS.

BT\Sources\Panther\setupact.log

Contains information about setup actions during the installation.
C:$WINDOWS.

BT\Sources\Panther\setuperr.log

Contains information about setup errors during the installation.
C:$WINDOWS.

BT\Sources\Panther\miglog.xml

Contains information about the user directory structure. This information includes security identifiers (SIDs).
C:$WINDOWS.

BT\Sources\Panther\PreGatherPnPList.log

Contains information about the initial capture of devices that are on the system during the downlevel phase.

Windows Preinstallation Environment phase

The Windows Preinstallation Environment (Windows PE or WinPE) phase is the Windows setup phase that occurs after the restart at the end of the downlevel phase, or when you start the computer by using the Windows installation media. The following table lists important log files in this setup phase.

Log file Description
X:$WINDOWS.

BT\Sources\Panther\setupact.log

Contains information about setup actions during the installation.
X:$WINDOWS.

BT\Sources\Panther\setuperr.log

Contains information about setup errors during the installation.
X:$WINDOWS.

BT\Sources\Panther\miglog.xml

Contains information about the user directory structure. This information includes security identifiers (SIDs).
X:$WINDOWS.

BT\Sources\Panther\PreGatherPnPList.log

Contains information about the initial capture of devices that are on the system during the downlevel phase.
or
C:$WINDOWS.

BT\Sources\Panther\setupact.log

Contains information about setup actions during the installation.
C:$WINDOWS.

BT\Sources\Panther\setuperr.log

Contains information about setup errors during the installation.
C:$WINDOWS.

BT\Sources\Panther\miglog.xml

Contains information about the user directory structure. This information includes security identifiers (SIDs).
C:$WINDOWS.

BT\Sources\Panther\PreGatherPnPList.log

Contains information about the initial capture of devices that are on the system during the downlevel phase.

You may also see a log file in the X:\WINDOWS directory. The Setupact.log file in this directory contains information about the progress of the initial options that are selected on the Windows installation screen. The Windows installation screen appears when you start the computer by using the Windows installation media. After you select Install now from the Windows installation screen, the Setup.exe file starts, and this log file is no longer used.

Online configuration phase

The online configuration phase (the first boot phase) starts when you receive the following message:

Please wait a moment while Windows prepares to start for the first time.

During this phase, basic hardware support is installed. If it’s an upgrade installation, data and programs are also migrated. The following table lists important log files in this setup phase.

Log file Description
C:\WINDOWS\PANTHER\setupact.log Contains information about setup actions during the installation.
C:\WINDOWS\PANTHER\setuperr.log Contains information about setup errors during the installation.
C:\WINDOWS\PANTHER\miglog.xml Contains information about the user directory structure. This information includes security identifiers (SIDs).
C:\WINDOWS\INF\setupapi.dev.log Contains information about Plug and Play devices and driver installation.
C:\WINDOWS\INF\setupapi.app.log Contains information about application installation.
C:\WINDOWS\Panther\PostGatherPnPList.log Contains information about the capture of devices that are on the system after the online configuration phase.
C:\WINDOWS\Panther\PreGatherPnPList.log Contains information about the initial capture of devices that are on the system during the downlevel phase.

Windows Welcome phase

The Windows Welcome phase includes the following options and events:

  • It provides the options to create user accounts.
  • It provides the option to specify a name for the computer.
  • The Windows System Assessment Tool (Winsat.exe) finishes performance testing to determine the Windows Experience Index rating.

The Windows Welcome phase is the final setup phase before a user signs in. The following table lists important log files in this setup phase.

Log file Description
C:\WINDOWS\PANTHER\setupact.log Contains information about setup actions during the installation.
C:\WINDOWS\PANTHER\setuperr.log Contains information about setup errors during the installation.
C:\WINDOWS\PANTHER\miglog.xml Contains information about the user directory structure. This information includes security identifiers (SIDs).
C:\WINDOWS\INF\setupapi.dev.log Contains information about Plug and Play devices and driver installation.
C:\WINDOWS\INF\setupapi.app.log Contains information about application installation.
C:\WINDOWS\Panther\PostGatherPnPList.log Contains information about the capture of devices that are on the system after the online configuration phase.
C:\WINDOWS\Panther\PreGatherPnPList.log Contains information about the initial capture of devices that are on the system during the downlevel phase.
C:\WINDOWS\Performance\Winsat\winsat.log Contains information about the Windows System Assessment Tool performance testing results.

Rollback phase

If a Windows upgrade installation fails, and you’ve successfully rolled back the installation to the previous operating system desktop, there are several log files that you can use for troubleshooting. The following table lists important log files in this phase.

Читайте также:  Windows network share all users
Оцените статью