Finding boot logs in systemd journals

Systemd used a binary log to store information about specific events. These events include the boot sequence and the related output. In this article we have a look at finding our boot logs in systemd journals.

Binary logging

When using systemd, boot data is stored in journals, a binary format. There is big benefit of saving boot data in a binary format: log information of each boot can be stored separately, linked to other pieces of information, and queried easier and quicker. For example, different boots can be compared, as they are individually available.

The journal can be queried with the journalctl command. When using the --list-boots parameter, we get a list of entries which each represent a different system boot.

Screenshot with output of journalctl command using the --list-boots option

Output of journalctl --list-boots

In this output the first column is the reference ID. The last entry on screen (ID equals zero) is the active boot. The utility will give each boot a (negative) number to show how many boots is was ago.

The second field is the boot ID. These first two IDs can be used when referring to a specific boot. Next there is the day, date, time and timezone, when the first entry entered the journal. These are then followed by the same fields, representing the last entry of the journal.

With these references, we can now see the details of a specific boot by using the reference ID or boot ID itself.

journalctl -boot=fa733c82bc8c479bb1d92a964e4680e6

Learn more about journalctl

This article uses the journalctl command to achieve its tasks. For this popular tool there is a cheat sheet available!

» Mastering the tool: journalctl

journalctl cheat sheet

Related articles

Like to learn more? Here is a list of articles within the same category or having similar tags.

Feedback

Small picture of Michael Boelen

This article has been written by our Linux security expert Michael Boelen. With focus on creating high-quality articles and relevant examples, he wants to improve the field of Linux security. No more web full of copy-pasted blog posts.

Discovered outdated information or have a question? Share your thoughts. Thanks for your contribution!

Mastodon icon