If you are an Azure VMware Solution (AVS) user with a paid subscription or VMware Cloud core subscription for VMware Aria Operations for Logs (SaaS), VMware Aria Operations for Logs (SaaS) collects and analyzes logs generated in your AVS Software-Defined Data Center (SDDC).

For information about configuring your AVS log source, navigate to the Log Sources page and under VMware Cloud, click Azure VMware Solution (AVS).

For information about VMware Aria Operations for Logs (SaaS) subscriptions, see VMware Aria Operations for Logs (SaaS) Subscriptions and Billing.

VMware Aria Operations for Logs (SaaS) classifies AVS SDDC events matching the following rules as logs.
Overview Events
Event_provider contains "AZURE_AVS"
Firewall Source Events
Event_provider contains "AZURE_AVS"
vmw_vmc_audit_nsxt_firewall_action exists
vmw_vmc_audit_nsxt_firewall_src exists
Firewall Destination Events
Event_provider contains "AZURE_AVS"
vmw_vmc_audit_nsxt_firewall_action exists
vmw_vmc_audit_nsxt_firewall_dst exists
Application Ports Permitted
Event_provider contains "AZURE_AVS"
vmw_vmc_audit_nsxt_firewall_dst_ip_port exists
vmw_nsxt_firewall_client_to_server_bytes exists
vmw_vmc_audit_nsxt_firewall_dst_port exists
text contains 'inet term'
Application Ports Denied
Event_provider contains "AZURE_AVS"
vmw_vmc_audit_nsxt_firewall_dst_ip_port exists
vmw_vmc_audit_nsxt_firewall_dst_port exists
text contains 'drop' OR text contains 'reject' 
text contains 'inet match'
Severity Events
Event_provider contains "AZURE_AVS"
Severity Exists