NSX Cloud supports syslog forwarding.
You can enable syslog forwarding for Distributed Firewall (DFW) packets on managed VMs.
To learn more about how to configure NSX-T Data Center appliances and hypervisors to send log messages to a remote logging server, see Configure Remote Logging.
If logs are not received by the remote log server, see Troubleshooting Syslog Issues.
- Log in to PCG using the jump host.
- Type nsxcli to open the NSX-T Data Center CLI.
- Type the following commands to enable DFW log forwarding:
nsx-public-cloud-gateway> set gw-controller vm-log-forwarding enabled nsx-public-cloud-gateway> set logging-server <server-IP-address> proto udp level info messageid FIREWALL-PKTLOG
After this is set, NSX agent DFW packet logs are available under /var/log/syslog on PCG.
- To enable log forwarding per VM, enter the following command:
nsx-public-cloud-gateway> set gw-controller vm-log-forwarding enabled <vm-id>