NSX Cloud supports syslog forwarding.

You can enable syslog forwarding for Distributed Firewall (DFW) packets on managed VMs.

To learn more about how to configure NSX appliances and hypervisors to send log messages to a remote logging server, see Configure Remote Logging.

If logs are not received by the remote log server, see Troubleshooting Syslog Issues.

Procedure

  1. Log in to PCG using the jump host.
  2. Type nsxcli to open the NSX CLI.
  3. Type the following commands to enable DFW log forwarding:
    nsx-public-cloud-gateway> set gw-controller vm-log-forwarding enabled 
    nsx-public-cloud-gateway> set logging-server <server-IP-address> proto udp level info messageid FIREWALL-PKTLOG
    

    After this is set, NSX agent DFW packet logs are available under /var/log/syslog on PCG.

  4. To enable log forwarding per VM, enter the following command:
    nsx-public-cloud-gateway> set gw-controller vm-log-forwarding enabled <vm-id>