Logs Deployment & Use
Deploying VCF Operations for Logs — configuration, log forwarding, and using the platform for troubleshooting.
Phase: Post-Deployment (Day 2+)
This guide covers deploying VCF Operations for Logs (log analytics) and configuring core VCF components to forward logs into it.
2. Prerequisites
- Working DNS forward/reverse for
log.pgnet.io. - NTP is stable across the environment (time drift causes auth + TLS failures).
- VCF identity and certificates are in place (recommended): see Part 4.
- Depot has 9.0.2 operations-logs install binaries
Network ports (minimum)
443/tcpto access the Logs UI/API- Syslog ingestion (choose one):
514/udp(easy, but lossy)514/tcp(recommended for lab reliability)6514/tcp(syslog over TLS, if you enable/configure it)
3. Deploy VCF Operations for Logs
Deploy the Logs appliance from SDDC Manager (the exact menu label varies slightly by release, but it is under the VCF/Operations lifecycle area).
-
Make sure Fleet Management has downloaded intall binaries for 9.0.2 - Operations —> Fleet Management —> Lifecycle —> Binary Management
-
From Lifecycle —> Overview Add operations-logs
-
New Install

-
Generate a new certificate for the deployment - a wildcard works *.pgnet.io

-
Deploying logs appliance on second cluster.
Config:
Field Value vCenter Host vcw.pgnet.iovCenter Version 9.0.2.0.25148086VC Username svc-sddc@pgnet.localDatacenter / Cluster DEFAULT_DC/pgdc2#pgdc2cl1Storage (Datastore) pgVMFSNetwork (Portgroup) pg-dsw-pg-vmmgmtDisk Mode thinSetting Value Gateway 10.200.1.1Netmask 255.255.255.0DNS / NTP 10.200.1.240Domain / Search Path pgnet.ioFIPS Mode Enabled (true)VCF Enabled trueComponent Hostname IP Address Details Master Node logvm.pgnet.io10.200.1.25VM Name: pg-vm-vcflogCluster VIP log.pgnet.io10.200.1.19Type: vrli-cluster-1Node Size small— Version: 9.0.2.0Admin Email admin@pgnet.io— SSO Enabled: false -
Setup the Network
Post-deploy access check
- Open
https://log.pgnet.ioand confirm the UI loads. - Confirm you can authenticate with the local/admin account created during deployment.
4. Identity / SSO (recommended)
If you’re using the VCF embedded Identity Broker for the Operations suite, enable SSO for Logs the same way you did for Operations/Automation.
- Follow the identity broker setup in Part 4.
- In the VCF Operations suite SSO settings, ensure VCF Operations for Logs is enabled for the same SSO domain.
5. Forward logs into VCF Operations for Logs
Start by onboarding the highest-signal sources first: vCenter, NSX, SDDC Manager, and ESXi.
5.1 vCenter Server Appliance (VCSA)
Configure VCSA remote syslog forwarding to log.pgnet.io.
- In the VCSA management UI (
https://vc.pgnet.io:5480) configure Syslog to forward to the Logs appliance. - Example destination (TCP syslog):
tcp://log.pgnet.io:514
5.2 ESXi hosts
Configure each host to forward syslog to log.pgnet.io.
- In vCenter: host → Configure → System → Advanced System Settings
- Set
Syslog.global.logHostto the Logs destination. - Example value (TCP syslog):
tcp://log.pgnet.io:514
5.3 NSX Manager
Configure NSX to forward syslog events to log.pgnet.io.
- In NSX Manager: configure a Syslog server and point it at the Logs appliance.
- Prefer TCP (or TLS) over UDP for NSX audit + system events.
5.4 SDDC Manager
Configure SDDC Manager to forward logs/events to log.pgnet.io where supported.
6. Using Logs (minimum workflow)
- Open
https://log.pgnet.io. - Confirm ingestion by searching for a known hostname (examples):
vc.pgnet.io,nsx.pgnet.io,sddc.pgnet.io,pgesxa1.pgnet.io. - Create a saved query for common triage:
- auth failures (SSO/LDAPS)
- certificate/TLS errors
- NSX edge/BGP events
Quick verification checklist
- In the Logs UI, confirm you see events from
vc.pgnet.iowithin a few minutes of enabling forwarding. - If ESXi forwarding is enabled, search for
pgesxa1.pgnet.ioand validate new events arrive as you generate activity (e.g., login/logout). - If nothing arrives, validate the source can reach
log.pgnet.ioon the chosen syslog port.
7. Quick troubleshooting
- No logs arriving: confirm network reachability from sources to
log.pgnet.ioand verify each component’s syslog setting. - TLS/cert errors: ensure time sync is correct and that the relevant trust chain is installed.
- SSO problems: validate the identity broker config in Part 4 and confirm group mappings.