Vmware Architecting A Vmware Vrealize Log Insight Solution
Vmware Architecting A Vmware Vrealize Log Insight Solution
Vmware Architecting A Vmware Vrealize Log Insight Solution
Architecting a VMware
vRealize Log
Insight Solution for
VMware vCloud Air
Network
Version 2.7
February 2017
Martin Hosken
Architecting a VMware vRealize Log Insight Solution for VMware vCloud Air Network
2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. This product is covered by one or more patents listed at
http://www.vmware.com/download/patents.html.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective
companies.
VMware, Inc.
3401 Hillview Ave
Palo Alto, CA 94304
www.vmware.com
Contents
Overview ................................................................................................. 7
1.1 Audience ............................................................................................................................. 7
1.2 Assumptions and Caveats .................................................................................................. 7
List of Figures
Figure 1. Host Log Files ................................................................................................................................ 8
Figure 2. Syslog Message Structure ........................................................................................................... 16
Figure 3. Syslog Message Structure ........................................................................................................... 17
Figure 4. vRealize Log Insight Event Forwarder ......................................................................................... 26
Figure 5. Third-Party Syslog Aggregator .................................................................................................... 27
Figure 6. Management Cluster Environment .............................................................................................. 29
Figure 7. Typical Management Environment Conceptual Design............................................................... 39
Figure 8. Sample Service Provider Management Design ........................................................................... 41
Figure 9. Multitenant Scenario A ................................................................................................................. 44
Figure 10. Multitenant Scenario B............................................................................................................... 45
Figure 11. Edge Gateway Provider and Tenant Syslogs ............................................................................ 50
Figure 12. Design Scenario A ..................................................................................................................... 52
Figure 13. Design Scenario B ..................................................................................................................... 53
Figure 14. Design Scenario C ..................................................................................................................... 55
List of Tables
Table 1. Table Host Log Descriptions ........................................................................................................... 9
Table 2. vCenter Server Log Files .............................................................................................................. 13
Table 3. Message Severity Codes .............................................................................................................. 16
Table 4. Syslog Transport Protocols ........................................................................................................... 19
Table 5. Data Log Levels ............................................................................................................................ 22
Table 6. Modifiable Component Logs ......................................................................................................... 24
Table 7. Unsupported Log Level Changes ................................................................................................. 25
Table 8. Ingestion Rates by vRealize Log Insight Cluster Deployment Size .............................................. 31
Table 9. Sample Log Storage Requirements .............................................................................................. 33
Table 10. vRealize Log Insight Ports Source Message Data .................................................................. 36
Table 11. vRealize Log Insight Ports User Access .................................................................................. 37
Table 12. vRealize Log Insight Ports Internal Communication ................................................................ 37
Table 13. vRealize Log Insight Ports Additional Communication Ports ................................................... 38
Table 14. VMware vRealize Operations Manager ...................................................................................... 46
Table 15. vCloud Networking and Security Manager Logs......................................................................... 49
Table 16. vCloud Director for Service Providers Component Logging ....................................................... 49
Table 17. NSX Edge Logs........................................................................................................................... 50
Table 18. NSX Edge Log Format ................................................................................................................ 51
Overview
Within the data center, hardware and software systems are typically configured to forward log messages
to an external and centralized system message logging (syslog) destination. To improve system
administration and provide the VMware vCloud Air Network service provider community with the
security and investigative capabilities it requires, VMware recommends configuring logging to external
syslog servers from all hardware in the data center, including VMware ESXi hosts, storage, and
network components. By facilitating the aggregate analysis of log messages on an external server,
visibility is provided into events that affect multiple ESXi hosts and other data center components.
VMware provides several options for syslog target servers. A basic syslog server (VMware vSphere
Syslog Collector) is included as part of the VMware vCenter Server package. A second option is to
implement VMware vSphere Management Assistant for log consolidation. However, for a service provider
that is looking for deeper insight into their global data center infrastructure, VMware vRealize Log
Insight provides a much more comprehensive and feature rich solution than either vSphere Syslog
Collector or vSphere Management Assistant.
vRealize Log Insight gives administrators the ability to consolidate logs, monitor and troubleshoot
vSphere and third-party infrastructure, and perform security auditing, compliance testing, log querying,
aggregation, correlation, and retention. The vRealize Log Insight virtual appliance includes a syslog
server, log consolidation tool, and log analysis tool that will work for any type of device that can send
syslog data. vRealize Log Insight administrators can also create custom dashboards based on saved
queries that can be exported, shared, and integrated with vCenter Server and VMware vRealize
Operations Manager to provide a uniform approach to dashboard monitoring and operational
management.
1.1 Audience
This document addresses key design and architectural considerations relating specifically to vRealize Log
Insight as implemented by the vCloud Air Network based service provider community. While this
document provides a design framework for the vCloud Network community, it does not provide a specific
solution for either vCloud Air Network service providers or enterprise business customers.
This component of the VMware vCloud Architectural Toolkit for Service Providers addresses the
common questions that arise when designing a syslog solution with vRealize Log Insight. Its primary aim
is to focus on the design aspects of syslog within a vSphere environment by providing sample reference
architectures to further aid the design work of the VMware service provider partner community and to
provide new ideas for syslog management strategies for provider based service offerings.
This document does not consider operational aspects, troubleshooting techniques, or the log analysis
skills associated with syslog, because there are numerous resources available to assist with this. The
goal of this document is to assist you in undertaking the syslog aspects of a vSphere design and to help
you choose among the various options available for the architectural decisions you will be required to
make.
Note A symlink is a special type of file that contains a reference to another file in the form of an
absolute or relative path.
For more information, see Creating a persistent scratch location for 4.x/5.x/6.0 (1033696), available at
http://kb.vmware.com/kb/1033696.
The local ESXi logs can be accessed and inspected in one of several ways directly on each host:
VMware vSphere Client or VMware vSphere Web Client
DCUI (View system logs option)
Web browser (example: https://HostnameOrIPAddress/host)
Power-CLI Get-Log cmdlets
ESXi CLI (example: cat /var/log/hostd.log)
For more information about accessing ESXi logs, see Location of ESXi 5.0 log files (2004201) at
http://kb.vmware.com/kb/2004201.
The following table provides a comprehensive list of ESXi 6.0 host logs, their persistent location, and a
description. Many different log files are generated automatically by different ESXi components and
services.
Table 1. Table Host Log Descriptions
/var/log/esxcli.log
The exact list of ESXi host system component logs can vary from the files listed in the table, depending
on the version of hypervisor installed. This extensive logging on every single host in the infrastructure can
become unmanageable for both operational teams and administrators. This is where the benefits of
providing a centralized, consolidated, and searchable syslog solution can be appreciated.
In addition to the listed ESXi 6.x host logs, a number of additional component source logs are, by design,
not forwarded to a remote syslog server, but instead exist only on local persistent storage or in RAM disk.
The following is list of ESXi component log sources that are not part of the syslog mechanism:
configRP.log Resource pool changes
hostprofiletrace.log Host profiles information
smbios.bin Communication with smbios to provide hardware information
storagerm.log Storage resource management, including I/O throttling
vmauthd.log Authd information
vmkdevmgr.log Hardware device detection
vprobed.log Control and data logging
Note Administrators should be cautious when increasing logging levels to either trivia or verbose. If
you increase logging to one of these levels to help diagnose an issue, VMware highly
recommends reverting to the default logging level immediately after any troubleshooting activity is
complete.
The specific logs generated by vCenter Server will vary to some extent depending on the version
deployed. For more information, refer to Location of log files for VMware products (1021806) at
http://kb.vmware.com/kb/1021806.
For additional information about modifying logging levels in vCenter, see Increasing VMware vCenter
Server and VMware ESX/ESXi logging levels (1004795) at http://kb.vmware.com/kb/1004795 and
Enabling trivia logging in VMware vCenter (1001584) at http://kb.vmware.com/kb/1001584.
Note When a log file reaches its maximum size, it is rotated and numbered similar to component-
nnn.log files. The file might also be compressed.
Note The information provided here about performance statistic collection does not relate directly to the
previous discussions about log files, but instead relates to vCenter statistics stored in a database.
It is included here for completeness.
To configure an ESXi host to forward its logs to a centralized syslog server, the
Syslog.global.LogHost value must be configured in the Advanced Settings panel. The value of this
setting represents the remote host to which syslog messages will be forwarded and port on which the
remote host will receive syslog messages. This can be configured with the hostname or IP address,
followed by the port number, for example: udp://sysloghost.domin.local:514.
The transport protocol you choose, UDP by default, depends on a sites specific design requirements.
TCP and SSL are also supported. The syslog server value can be configured with the hostname or IP
address. The remote target system must have a syslog collector installed and be correctly configured to
receive the forwarded syslog messages before the hosts sending syslog messages are configured.
Otherwise, configured settings will not take effect.
Note Considerations for the design of centralized syslog collection systems are detailed in Section 3.4,
Remote Syslog Design Considerations,
Hosts can be configured in a number of ways to forward syslog messages to a centralized logging system
such as vRealize Log Insight. vRealize Log Insight includes the Configure ESXi tool, which can be used
to configure the entire ESXi environment for syslog message handling. Other alternatives include
esxcli, VMware vSphere PowerCLI, vCLI through the vSphere Management Assistant, vSphere Host
Profiles, or the manual approach described previously.
Note For more information about configuring hosts for syslog, see Configuring syslog on ESXi 5.x and
6.0 (2003322), at http://kb.vmware.com/kb/2003322.
If the target environment is licensed for vSphere Host Profiles (which is currently available only as an
Enterprise Plus feature), the method of aligning all ESXi hosts to use an external syslog server is likely
the preferred choice. Using host profiles allows you to standardize the host configuration throughout the
vSphere clusters, and they can also be used for other aspects of host configuration and compliance
monitoring for a site. vCenter reports on any element of configuration that drifts from its configured value.
Other techniques for applying the Syslog.global.LogHost value or modifying the ESXi firewall, such
as using scripts or performing a manual alignment, can create risk of configuration drift or incorrect
implementation. In addition, hosts provisioned using auto deploy typically do not have sufficient storage to
save system logs locally and receive their entire configuration through the host profile and answer file. In
those environments, they must be configured to use centralized syslog forwarding and configuration using
host profiles as just described.
With UDP, syslog clients can send messages over an IP network without prior communication to set up
special transmission channels or data paths. UDP has no handshaking process and, thus, provides no
guarantee of delivery of the syslog messages to the syslog target. This protocol is suitable for syslog
when error checking and correction are not necessary to meet site requirements. Time-sensitive packets
are dropped, which avoids extra processing overhead at the network interface level. This method of
handling is preferable to waiting to send delayed packets, which might not be an option in a real-time
monitoring system.
However, what if the solution design requires assurance that syslog messages are delivered to the syslog
server for compliance or regulatory reasons? If this is the case, you will need to employ a transport
protocol that uses reliable and ordered transmission methods and also provides error correction facilities
on the data stream at the network interface level, which, for syslog, is the Transmission Control Protocol
(TCP).
The network connection between the syslog source and the syslog target server is critical to confirming
that events are delivered at the remote destination. A number of factors affecting the underlining network,
such as latency, load, and the transport protocol used, can prevent log events from being delivered. With
UDP, logs can be dropped by the network, without any easy way of determining why. TCP guarantees
that the events are transported from the source to target server. TCP can be employed to overcome
unreliable network issues, but it does not ensure that the syslog server itself will capture and keep the
event. For example, if the vRealize Log Insight ingest pipeline is backed up, messages will be dropped,
even if TCP is used. TCP is still preferred over UDP, however, when transporting events between the
syslog source and target server, if traffic is traversing a WAN connection or another less reliable network.
What if a service provider requires syslog data to be encrypted between source and destination to meet
solution requirements? After all, the information contained in syslog entries could be highly sensitive and
easily be used by a hacker to map the network, uncover what hardware is being operated in the data
center, and find vulnerabilities within the infrastructure. For these reasons, syslog also supports the ability
to encrypt traffic with Transport Layer Security (TLS), allowing messages to be delivered to the target
syslog server using TLS over TCP.
Note TLS is the more secure successor of SSL. When people talk about SSL encryption, they usually
mean TLS encryption.
Typically, a solution architect will base design decisions regarding transport protocols on the following
requirements and constraints:
Use TCP when possible, especially between syslog aggregators and syslog servers or any traffic
going over a WAN. Understand that TCP does not guarantee that events are not dropped. If the
vRealize Log Insight ingest pipeline is backed up, messages will be dropped.
ESXi supports all protocols. However, if other syslog client devices do not support TCP, then UDP is
required. Use encryption when it is a specific service provider requirement to secure syslog data as it
transverses the network, particularly over unsecured or WAN links.
VMware NSX Manager virtual appliance and the VMware NSX API centralize the provisioning of
logical networking components and manage the connection of virtual machines and storage objects
to the networking functions, which also includes syslog transport.
By default, host logging levels vary from service to service. For example, vpxa and the Host Agent are
configured to log data at the Verbose level by default, while the hostd service has a default log-level
setting of Info.
You can verify the logging level in different ways for different host services. For example, the Host Agent
and vpxa current logging levels can be queried with the following vSphere PowerCLI commands:
Get-VMHost | Get-VMHostAdvancedConfiguration -Name Config.HostAgent.log.level"
Get-VMHost | Get-VMHostAdvancedConfiguration -Name Vpx.Vpxa.config.log.level
hostd logs are controlled by a setting in the config.xml file, located in the /etc/vmware/hostd
subdirectory of an ESXi system.
The logging level to choose for a design depends on the specific service provider requirements and
whether vRealize Log Insight is intended to be used proactively or reactively.
If the syslog data is to be employed only reactively when a problem is detected, configuring the logging
level to Warning might be sufficient. However, if you configure only the Error or Warning level, it might be
too late to prevent a problem from occurring, and you might not be able to find the root cause of a
problem without Info level log information.
If the providers intention is to use the syslog data proactively, Info level logging is more appropriate as a
way to gather lower level information, before a problem arises. It is also possible for messages to be
logged at the wrong level, for example, error messages being logged as Info and informational logs being
marked as Error. It is also possible that Error and Warning messages might be generated so infrequently
that you do not know if logging is working properly.
In contrast, solution designers may also consider factors that might influence a solution to collect less log
data. That is, requirements for a solution design might specify that only Error or Warning level logs are
forwarded, for any of the following reasons:
Too much storage space is required to keep the messages.
It is too expensive to query the information (for example, with a product that charges fees per GB of
log data).
It is too much of a challenge to find the relevant logs, usually due to a lack of a scalable provider
based logging solution.
Logs are used as a monitoring tool only and the provider cares only about error and warning events.
Unless an error or warning message is seen, logs are not usually or rarely analyzed.
Another aspect to consider for a remote syslog design is the bandwidth available between source and
syslog target. When services are logged at the verbose level, a significant amount of data is typically
directed to the syslog server. There could be as many as 5000 to 10,000 logs in each 5-minute period,
depending on the size of the environment.
By switching the hostagent and vpx levels from verbose to warning, you might see a reduction of
approximately 10 to 15 log messages for the same 5-minute time period. When a design is constrained
by limited bandwidth between sites, this drop in log volume could provide a significant savings and have
an even larger impact for traffic on the wide area network.
The following services can be easily modified to throttle remote logging on an ESXi 6.x host.
Table 6. Modifiable Component Logs
You can use the Advanced Settings panel in the vSphere Web Client, as shown in the following figure, to
modify individual log-level settings.
You can also use vSphere PowerCLI with the Set-AdvancedSetting cmdlet or host profiles to model
log-level settings.
While it is possible to modify the logging levels of other components and services to further throttle syslog
messages in remote architectures, changing the default configuration of the following files is not
supported. Modify the following component levels only if directed by VMware to do so.
For more information relating to modifying ESXi component logging levels, see Increasing VMware
vCenter Server and VMware ESX/ESXi logging levels (1004795) at http://kb.vmware.com/kb/1004795.
For more information on Enabling trivia logging in VMware vCenter Server (1001584) at
http://kb.vmware.com/kb/1001584.
Both vRealize Log Insight forwarding and syslog aggregators provide some flexibility and control of how
events are forwarded, the format they are forwarded in, the protocol used, and where they are forwarded
to. They can also provide design advantages with their ability to limit the configuration changes required
when reconfiguring syslog targets. For example, you might need to change only the configuration of the
syslog aggregators, as opposed to every source device in the infrastructure, which can be useful from a
BCDR design and planning perspective. Syslog aggregators also provide granular control and can be
configured to send some or all of the messages that they receive and the messages they generate
internally. The following figure shows a typical use case for employing vRealize Log Insight to forward
syslog message events in the data center.
Figure 4. vRealize Log Insight Event Forwarder
When implementing this type of forwarding solution, you should configure the syslog aggregators to
maintain the original source IP or hostname of the device when forwarding the messages to the
centralized syslog server. This is extremely important to provide successful auditing, querying, and
analysis of logs.
Finally, syslog aggregators can also be used effectively in a scenario where the syslog target is located
on a different network segment (VLAN) than the source host and a firewall sits between the two devices.
This allows for significantly more granularity when it comes to configuring a firewalls access control list
(ACL). For example, a network security team is likely to be far more comfortable configuring a firewall
ruleset that allows traffic from a single source IP address to pass through to a single destination IP
address, than allowing a whole network segment to pass traffic over the security appliance on port 514.
The following figure shows a use case where third-party syslog aggregators are employed.
There is one final design consideration for the use of forwarders and syslog aggregators. In a smaller
environment, sending syslog traffic directly to a vRealize Log Insight cluster would typically be fine.
However, in a multi-site, multi-zone complex service provider environment, VMware recommends that
designs employ forwarders in front of the core vRealize Log Insight instances at whatever points are
appropriate in the architecture. For instance, forwarders might be deployed in every data center, at a
minimum, including the local data center facility where the core vRealize Log Insight instance is located.
Also, you might provide an additional level of granularity, depending on the solution design and network
architecture, by including additional forwarder instances per network segment, per tenant, or per business
unit.
Although syslog forwarders and aggregators increase architecture complexity with their initial setup and
configuration (and the potential involvement of more third-party systems), they are often an architectural
necessity to meet a service providers complex mix of challenging requirements and environment
circumstances such as network routing, firewalling, or providing a globally distributed architecture.
An additional complication to the solution design is that the vCloud Air Network service provider might
want such forwarders or aggregators to be highly available. In this case, vRealize Log Insight forwarders
would have to be clustered for event message ingestion, providing a highly available configuration,
requiring a minimum of three nodes per forwarder instance. When considering the virtual appliance sizing
for dedicated forwarding instances of vRealize Log Insight, small deployments should typically be
sufficient to meet the needs of most environments, because the forwarders themselves are not going to
be used as the primary mechanism to store ingested events or to perform operational queries of the
environment.
This configuration might require modification, depending on the design approach to NTP. It is important to
maintain consistent NTP server configuration across the entire global infrastructure. When configuring the
vRealize Log Insight virtual appliance with NTP sources, VMware recommends that you use a minimum
of two reference clocks.
For more information on configuring NTP in vSphere environments, see Configuring syslog logging for
hostd and vpxa management agents on ESXi/ESX (1017658) at http://kb.vmware.com/kb/1017658.
4.2 Clusters
vRealize Log Insight 2.0 introduced the ability to create multi-node application level clusters, providing
support for high availability and, by scaling-out, increasing the log message ingestion rates to the scale
required by large service provider customers.
When designing a vRealize Log Insight production environment, a minimum of three nodes is required to
form an HA cluster. This supports highly available ingestion, the ability to easily scale-out, and the ability
to perform maintenance on a live environment. Additionally, vRealize Log Insight clusters provide support
for the following:
A scale-out approach to designs using a centralized logging service.
Multiple vRealize Log Insight instances working together and managed centrally.
Log ingestion high availability that can be achieved either through the interpreted load balancer or by
placing a third party load balancer in front of the cluster to handle the ingestion of syslog messages,
evenly distributing the data across cluster nodes.
Up to a 12-node cluster with one node as the master and up to eleven other nodes as workers.
Both master and worker nodes capable of ingesting syslog messages.
Querying of events from a single dashboard, even if the messages exist on separate nodes.
When designing a service provider management solution, VMware also recommends the use of the
integrated load balancer, which allows for distributed ingestion of messages across the cluster nodes and
provides high availability for the syslog service. All events are forwarded to the load balancer VIP
address, as opposed to the individual vRealize Log Insight nodes. If a vRealize Log Insight node goes
down, for example, as a result of host hardware failure, the load balancer will continue to direct events to
other nodes within the same cluster. The failed appliance restarts on a different host through the standard
vSphere HA mechanism, and there is no service downtime.
If possible, the vRealize Log Insight cluster design should also distribute vRealize Log Insight nodes
across multiple ESXi hosts in the management cluster to maximize service availability. You can apply a
vSphere Distributed Resource Scheduler anti-affinity rule on the group of vRealize Log Insight virtual
appliances to increase the availability of the syslog service provided by the cluster. You can also use this
rule to specify the relationship between the virtual appliances in the group, so that they remain on
separate hosts, thus minimizing the impact caused by a vSphere host restart in a standard vSphere HA
environment.
This aligns with the standard VMware recommendation of separating servers and providing redundancy
for other critical roles at the application layer to avoid service downtime if a vSphere host fails.
Figure 6. Management Cluster Environment
When evaluating the design factors for vRealize Log Insight clusters, keep in mind the following
architectural design points:
A minimum of three nodes is required in a cluster to provide high availability.
All nodes must be in the same data center, because vRealize Log Insight does not support geo-
clustering.
All cluster nodes must be in the same Layer 2 network segment if an integrated load balancer is
employed.
Employ either the integrated load balancer or use an external load balancer to load balance traffic
across nodes in the cluster.
As with any design decision, whether to opt for the integrated load balancer, or an external load balancer,
will come down to the specific customer use cases and requirements, and any other key design factors.
When evaluating the load balancing options, consider the following key points:
The integrated load balancer service runs on the existing vRealize Log Insight nodes and is simple to
configure with only an additional IP address required. There is no additional cost or operational
support required.
The integrated load balancer supports all vRealize Log Insight ingestion protocols, including Layer 4
and 7 load balancing, with no additional configuration required.
While only a single VIP can be configured with the integrated solution, and all nodes must be on the
same Layer 2 network segment, the native load balancer configuration is capable of supporting the
maximum ingestion load of the vRealize Log Insight cluster.
External load balancers, while capable of performing multiple load balancing tasks, are typically
managed by a different operational team, which might introduce delays in configuration and
operational support.
If you elect to use an external load balancer for the design, you can choose from a range of physical or
virtual devices, however, VMware does not provide any specific recommendation. The following list
includes some vendor technologies that can provide the required load balancing services:
NSX Edge and VMware vCloud Networking and Security Edge devices
Cisco ACE/CSS (these devices are end-of-life)
F5
Kemp LoadMaster
Riverbed
Barracuda Load Balancer
If you are looking for a free open source solution for a proof-of-concept or lab environment, look at
HAproxy/NGINX at http://www.haproxy.org/. If you require UDP load balancing, you can look at the Zen
Load Balancer at http://www.zenloadbalancer.com/community/downloads/.
Note Adding additional vCPU resources to vRealize Log Insight virtual appliances will improve query
and ingestion performance.
With vRealize Log Insight 3.0 supporting up to 12 nodes in a cluster, the architecture can scale out to
likely meet the needs of the most demanding vCloud Air Network service providers that deploy VMware
infrastructure across numerous geographically dispersed data centers.
Scaling out and providing high availability are the primary reasons to take a clustered approach to
deployment. For example, it might be more appropriate to design a solution that employs three or four
small nodes as opposed to a single medium or large node. This method provides the same or higher
ingestion rate but has the added benefit of supporting high availability.
Designers should architect a solution to meet the current ingestion rate needs of the infrastructure, while
also allowing for growth in the providers requirements. In addition, always deploy the vRealize Log
Insight virtual appliance with thick-provisioned, eager-zeroed disks. This allows for improved performance
and operation of the virtual appliance.
After data archiving is configured, it is the operational teams responsibility to verify that the archive
destination is cleaned up and maintained, and does not run out of space. vRealize Log Insight does not
have any mechanism to manage or monitor the NFS destination, and will continue to attempt to archive
data, even after the destination becomes full. Typically, a simple cleanup script can be leveraged to
manage this.
Note For the current list of available Content Packs, refer to the VMware Solution Exchange at the web
address just listed.
To forward logs from Microsoft Windows Servers or Microsoft Windows-based applications such as Active
Directory or Exchange, the vRealize Log Insight Windows agent must be installed on each source
operating system, allowing messages from Windows event channels and log files to be forwarded to the
vRealize Log Insight server. In vRealize Log Insight 3.0, there is limit of 60 Windows event log channels.
(See vRealize Log Insight 3.0 GA Configuration Limits at http://pubs.vmware.com/log-insight-
30/index.jsp?topic=%2Fcom.vmware.log-insight.administration.doc%2FGUID-0601A373-4B74-4B93-
8C39-DA85F1D34FD4.html .)
Linux operating systems typically include a syslog agent. If not, you can usually install one. The most
common syslog agents found on Linux operating systems are rsyslog and syslog-ng.
For more information about forwarding Microsoft Windows event logs to vRealize Log Insight, see the
VMware Realize Log Insight Administration Guide available at https://www.vmware.com/support/pubs/log-
insight-pubs.html.
vRealize Log Insight supports the ability to authenticate users using Active Directory instead of the
vRealize Log Insight built-in authentication method. This provide auditable role-based access control by
way of group membership, and also eliminates the need for administrative users to remember additional
user names and passwords.
Note For more information on integrating Active Directory authentication into vRealize Log Insight, see
the VMware vRealize Log Insight Administration Guide at
https://www.vmware.com/support/pubs/log-insight-pubs.html.
The following is a list of best practices to keep in mind when configuring role-based access control with
vRealize Log Insight:
Grant permissions using a privileged account and not a standard login account.
Assign permissions to Active Directory groups, not individual user accounts. Avoid the use of
vRealize Log Insight local accounts.
Follow the principle of least privilege. Grant permissions only when needed, and provide only the
minimum permissions required to meet a group members need.
Create new Active Directory groups for vRealize Log Insight users and administrators. Avoid using
built-in Windows groups or other existing groups.
Use caution when granting root access to vRealize Log Insight.
When employing Active Directory in vRealize Log Insight you are required to provide credentials for a
binding user. VMware recommends you use an Active Directory service account for this binding user
mechanism. This will mitigate issues such as user credentials expiring or the user credentials becoming
locked out, resulting in no Active Directory users being able to log into the vRealize Log Insight user
interface.
6.2 Certificates
vRealize Log Insight supports the ability to upload a service providers own certificate, obtained from a
commercial or internal certificate authority, to replace the default VMware self-signed certificate. To
replace the certificate, go to the SSL certificate section of the vRealize Log Insight user interface.
For more information on modifying certificates in vRealize Log Insight, see the VMware vRealize Log
Insight Administration Guide available at https://www.vmware.com/support/pubs/log-insight-pubs.html.
System sending Log Insight 1514/TCP, Syslog-TLS Syslog data over SSL
logs appliance 6514/TCP (SSL)
System sending Log Insight 9000/TCP vRealize Log vRealize Log Insight
logs appliance Insight Ingestion Ingestion API
API
System sending Log Insight 9543/TCP vRealize Log vRealize Log Insight
logs appliance Insight Ingestion Ingestion API - TLS
API (SSL) (SSL)
The following ports need to be open to vRealize Log Insight to allow access to the user interface for
administrators and operational teams.
Table 11. vRealize Log Insight Ports User Access
The following ports are only used for internal cluster communication between vRealize Log Insight master
and worker nodes and they are only required to be open if a solution design does not allow for direct
Layer 2 communication between the vRealize Log Insight cluster nodes. Normally a solution design would
allow direct layer 2 communication between nodes, however this might not be the case, for example, if
the vRealize Log Insight cluster nodes exist on separate network segments with a firewall restricting traffic
between them. The restriction on Layer 2 communication might also exist if the design employs a
distributed software-based firewall solution that restricts traffic between the cluster nodes.
Table 12. vRealize Log Insight Ports Internal Communication
Worker Log Master Log 16520- Thrift RPC Log Insight cluster
Insight appliance Insight appliance 16580/TCP services
Worker Log Master Log 59778/TCP log4j server Log Insight cluster
Insight appliance Insight appliance services
Worker Log Master Log 12543/TCP database server Log Insight cluster
Insight appliance Insight appliance services
Other vRealize Log Insight communication ports might be required, depending on other features
employed in the infrastructure design.
Table 13. vRealize Log Insight Ports Additional Communication Ports
vRealize Log vRealize Log 111, 978 TCP, UDP RPCbind service that
Insight appliance Insight appliance converts RPC program
numbers into universal
addresses
A primary goal of the management environment should be simplicity. Designing a simple and static
environment minimizes the risks of misconfiguration or human error. Furthermore, limiting the need for
change and minimizing the technologies employed will further reduce risk and speed up RTOs, should an
outage or problem arise.
Running the management components on a large cluster or within a mixed production cluster complicates
troubleshooting and makes it more difficult to track down management virtual machines in a recovery
scenario. The optimum size of the management cluster will vary depending on the service providers
requirements for management components. VMware recommends a minimum of a three-node cluster to
provide sufficient resources to manage the production infrastructure components while maintaining the
recommended operational availability of N+1. You can scale out hosts further if the management cluster
becomes resource constrained.
Physically separating the management cluster to different racks, hosts, and switches provides a clear
demarcation point between the management and production workloads, and helps to prevent an outage
in which one environment affects the other. It might also be appropriate to place a firewall between the
two environments to enhance security. The ultimate aim of the management pod should be that any type
of incident or outage affecting the production system cannot impact the management tools, and any type
of problem with the management components cannot impact the production workload systems.
Provider Consumer
Security Security Analyse Ops Ops Ops Ops
IT Operations Admin Admin
Discover
User User User User
Visualize
vRealize Operations UI vRealize Operations API Log Insight UI Log Insight API
Component Component
Dashboard UI Dashboard
Log Insight UI
vRealize Log Insight
Cluster
Integrated Load
Balancer
Storage vCenter
Adapters Adapters
vCenter Servers
Legend Log Insight Syslog Forwarder Cluster
Log Insight Syslog Forwarder Cluster
= Virtual Machine
OS and Application
Monitoring London Data Center Frankfurt Data Center
RHEL RHEL
SQL Server RAC Central Mailbox Server A Server B
Services Server x24
Compute
x24 x24
Compute
x24
Compute Compute
Nodes Nodes Nodes Nodes
These events, tasks, alerts and alarms are collected in vRealize Log Insight as structured data with
specific meaning attached to entries in individual fields of the data. In addition, vRealize Log Insight
ingests vCenter logs that contain unstructured data which can be queried, aggregated, correlated, and
retained for auditing purposes as necessary.
Scenario A employs the built-in functionality provided by most devices, that is, ability to send syslog
messages to two or more independent targets. In this example, ESXi hosts are configured to send syslog
messages to two separate instances, consumer and provider, with the consumer instance possibly
residing within the consumers organizational virtual data center. Note that some devices, such as
VMware ESXi 4.x, support only a single syslog target.
Figure 9. Multitenant Scenario A
Scenario B vRealize Log Insight Forwards are being employed to forward syslog event messages to the
secondary consumer instance. This has the advantage of allowing the provider to filter messages before
they are forwarded.
Figure 10. Multitenant Scenario B
In addition to these two scenarios, vRealize Log Insight supports multi-tenant logging, in which you can
control who sees what data. Through the built-in role-based access control (RBAC) mechanism, it is
possible to control access to data sets, dashboards, interactive analytics, and administrative tasks. By
configuring data sets, a static filter can be assigned to roles. Defining one or more static filters to restrict
data helps provide the user interface restrictions that control what people can see and do in vRealize Log
Insight.
vCloud Director Standard Linux log Syslog targets through syslog.conf or agent
system logs locations: retrieval
/var/log/messages
and /var/log/secure
log4j.appender.vcloud.system.syslog=org.apache.log4j.net.SyslogAppender
log4j.appender.vcloud.system.syslog.syslogHost=10.10.10.250
#Logs go to port 514 unless you specify a port, as in the disable example below.
#log4j.appender.vcloud.system.syslog.syslogHost=remoteSyslogHost.example.com:5555
log4j.appender.vcloud.system.syslog.facility=LOCAL1
log4j.appender.vcloud.system.syslog.layout=com.vmware.vcloud.logging.CustomPatternL
ayout
log4j.appender.vcloud.system.syslog.layout.ConversionPattern=%d{ISO8601} | %-8.8p |
%-25.50t | %-30.50c{1} | %m | %x%n
log4j.appender.vcloud.system.syslog.threshold=INFO
3. In the code block, you can see that you can also control the level of logging being sent through to
vRealize Log Insight by editing that last line and changing the threshold to WARN or CRITICAL.
4. Once that section has been added, go back to the top of the file and modify line 2 as shown here:
#Root logger
log4j.rootLogger=ERROR, vcloud.system.debug, vcloud.system.info
log4j.rootLogger=ERROR, vcloud.system.debug, vcloud.system.info,
vcloud.system.syslog
In examining source logs, log entries related to a specific customer can be identified using their
organization id, that is part of vCloud Director log entry contains: currentContext.login.org.id=###
The following code block provides an example of the type of information included in a typical log file.
currentContext.o...<13>...rg.id=ACME(com.vmware.vcloud.entity.org:3c8970fb-3b5b-
482a-8056-b229744ad6f8),
task.ownerId=659e986c-21d5-49ed-b718-8a8d38e99811,
currentContext.success=true,
currentContext.login.org.id=com.vmware.vcloud.entity.org:3c8970fb-3b5b-482a-8056-
b229744ad6f8,
NSX Controller The only supported method for configuring the syslog server on an NSX
controller is through the VMware NSX API.
See Configuring syslog server for VMware NSX for vSphere 6.x controllers
(2092228) at http://kb.vmware.com/kb/2092228.
ESXi hosts *
vRealize Orchestrator *
NSX Manager *
NSX Edge * *
A tenant can also deploy their own vRealize Log Insight appliance to a dedicated Org in a virtual data
center network. The subnet and IP address of the tenants syslog server must match the secondary
syslog address of NSX Edge gateways. This allows the tenant to see the NSX edge logs in real time,
which is very useful for troubleshooting.
NSX Edge rule events. With the log box Remote or optional tenant syslog
checked, the logs described here are
interactions with firewall rules.
The following code block provides an example log entry from NSX Edge.
The vRealize Log Insight server adds the IP address of the syslog sender, which is the NSX Edge
gateway network logging external interface.
The following table provides an overview of the format of NSX Edge Logs. For example, filtering on
Organization-ID allows creation of dashboards specific to individual tenants.
Table 18. NSX Edge Log Format
Date-Time Date and Time in format: Month Day HH:MM:SS, for example:
Sep 5 10:50: 56
Program/Daemon-Name Name of the daemon or program that is logging this message (for
example: DHCP, kernel, pluto, nginx)
PID PID of the program logging this message. This is optional, especially
for kernel and iptables related messages. PID is not logged.
EdgeService/Action- This is optional. For some log messages (where daemon name does
Identifier not specify the EdgeService uniquely), service identifier is prefixed to
the log message (for example: DNAT, SNAT, Firewall-policyapplied-
to-rule=ACCEPT|DROP).
The following information provides specific comments about this scenario and accompanying solution
design.
Syslog transport protocol: UDP UDP is the most efficient protocol for local network syslog
traffic most often used when there is no specific requirement
to verify data packet delivery.
Single vRealize Log Insight instance Sufficient for this design, as the number of source hosts will
not go above the ingestion limit of 750. No vRealize Log
Insight redundancy is provided other than standard vSphere
HA protection, protecting against host failure. Another
solution would be to provide a vRealize Log Insight cluster
made up of two or more smaller instances. This would have
the added advantage of providing an increase in syslog
application availability.
The following information provides some specific comments about this scenario and accompanying
solution design.
Redundant vRealize Log Insight Provides a HA solution along with meeting the source ingest
appliances. requirement.
Hosts are to be configured to forward esxcli system syslog config set --loghost=
syslog data to two target addresses.
'tcp://10.4.0.150:514,tcp://10.5.0.150:514'
Local syslog data is being TCP is the protocol of choice where the service provider
transported over TCP to the local requires assurance of message datagram delivery.
NOC.
A syslog aggregator is used to The use of a syslog aggregator in this design limits source
convert TCP messages to SSL and traffic across the public network to a single address and
then forward them across a secure provides a local target for client syslog configuration. In this
WAN link to the remote NOC. design, traffic is also being repackaged from TCP to SSL/TCP
to meet the providers security requirements.
The following information provides some specific comments about this scenario and accompanying
solution design.
Redundant vRealize Provides a HA solution along with meeting the source ingest requirement.
Log Insight appliances
Secure Design Meets a providers requirement that all syslog data is secure while in transit
across private and public networks.
Syslog aggregator or The use of a syslog aggregator in this design limits source traffic across
forwarder the public network to a single address and provides a local target for client
syslog configuration.
Syslog transport SSL is employed to secure sensitive log data on internal networks and
protocol: SSL across a MPLS link. Connection to the secondary data center is through a
VPN tunnel created, in this case, between two Cisco ASA 5500 firewall
devices.
HA Load Balancer HA Pair of NSX Edge devices configured to load balance traffic evenly
across Log Insight nodes. Load balancing algorithm configured as least
connections:
LEAST_CONN on TCP 1514
Reference Documents
The following vRealize documents are available for additional information on vRealize Log Insight: