vcf logging observability

Logs Deployment & Use

Deploying VCF Operations for Logs — configuration, log forwarding, and using the platform for troubleshooting.

Phase: Post-Deployment (Day 2+)

This guide covers deploying VCF Operations for Logs (log analytics) and configuring core VCF components to forward logs into it.

2. Prerequisites

  • Working DNS forward/reverse for log.pgnet.io.
  • NTP is stable across the environment (time drift causes auth + TLS failures).
  • VCF identity and certificates are in place (recommended): see Part 4.
  • Depot has 9.0.2 operations-logs install binaries

Network ports (minimum)

  • 443/tcp to access the Logs UI/API
  • Syslog ingestion (choose one):
    • 514/udp (easy, but lossy)
    • 514/tcp (recommended for lab reliability)
    • 6514/tcp (syslog over TLS, if you enable/configure it)

3. Deploy VCF Operations for Logs

Deploy the Logs appliance from SDDC Manager (the exact menu label varies slightly by release, but it is under the VCF/Operations lifecycle area).

  1. Make sure Fleet Management has downloaded intall binaries for 9.0.2 - Operations —> Fleet Management —> Lifecycle —> Binary Management

    CleanShot 2026-02-15 at 19.59.27@2x
  2. From Lifecycle —> Overview Add operations-logs

  3. New Install

    ![CleanShot 2026-02-15 at 20.02.25@2x](/img/guides/vcf-9-lab/CleanShot 2026-02-15 at 20.02.25@2x.png)

  4. Generate a new certificate for the deployment - a wildcard works *.pgnet.io

    ![CleanShot 2026-02-15 at 20.15.15@2x](/img/guides/vcf-9-lab/CleanShot 2026-02-15 at 20.15.15@2x.png)

  5. Deploying logs appliance on second cluster.

    Config:

    FieldValue
    vCenter Hostvcw.pgnet.io
    vCenter Version9.0.2.0.25148086
    VC Usernamesvc-sddc@pgnet.local
    Datacenter / ClusterDEFAULT_DC / pgdc2#pgdc2cl1
    Storage (Datastore)pgVMFS
    Network (Portgroup)pg-dsw-pg-vmmgmt
    Disk Modethin
    SettingValue
    Gateway10.200.1.1
    Netmask255.255.255.0
    DNS / NTP10.200.1.240
    Domain / Search Pathpgnet.io
    FIPS ModeEnabled (true)
    VCF Enabledtrue
    ComponentHostnameIP AddressDetails
    Master Nodelogvm.pgnet.io10.200.1.25VM Name: pg-vm-vcflog
    Cluster VIPlog.pgnet.io10.200.1.19Type: vrli-cluster-1
    Node SizesmallVersion: 9.0.2.0
    Admin Emailadmin@pgnet.ioSSO Enabled: false
  6. Setup the Network

Post-deploy access check

  • Open https://log.pgnet.io and confirm the UI loads.
  • Confirm you can authenticate with the local/admin account created during deployment.

If you’re using the VCF embedded Identity Broker for the Operations suite, enable SSO for Logs the same way you did for Operations/Automation.

  • Follow the identity broker setup in Part 4.
  • In the VCF Operations suite SSO settings, ensure VCF Operations for Logs is enabled for the same SSO domain.

5. Forward logs into VCF Operations for Logs

Start by onboarding the highest-signal sources first: vCenter, NSX, SDDC Manager, and ESXi.

5.1 vCenter Server Appliance (VCSA)

Configure VCSA remote syslog forwarding to log.pgnet.io.

  • In the VCSA management UI (https://vc.pgnet.io:5480) configure Syslog to forward to the Logs appliance.
  • Example destination (TCP syslog): tcp://log.pgnet.io:514

5.2 ESXi hosts

Configure each host to forward syslog to log.pgnet.io.

  • In vCenter: host → ConfigureSystemAdvanced System Settings
  • Set Syslog.global.logHost to the Logs destination.
  • Example value (TCP syslog): tcp://log.pgnet.io:514

5.3 NSX Manager

Configure NSX to forward syslog events to log.pgnet.io.

  • In NSX Manager: configure a Syslog server and point it at the Logs appliance.
  • Prefer TCP (or TLS) over UDP for NSX audit + system events.

5.4 SDDC Manager

Configure SDDC Manager to forward logs/events to log.pgnet.io where supported.

6. Using Logs (minimum workflow)

  1. Open https://log.pgnet.io.
  2. Confirm ingestion by searching for a known hostname (examples): vc.pgnet.io, nsx.pgnet.io, sddc.pgnet.io, pgesxa1.pgnet.io.
  3. Create a saved query for common triage:
    • auth failures (SSO/LDAPS)
    • certificate/TLS errors
    • NSX edge/BGP events

Quick verification checklist

  • In the Logs UI, confirm you see events from vc.pgnet.io within a few minutes of enabling forwarding.
  • If ESXi forwarding is enabled, search for pgesxa1.pgnet.io and validate new events arrive as you generate activity (e.g., login/logout).
  • If nothing arrives, validate the source can reach log.pgnet.io on the chosen syslog port.

7. Quick troubleshooting

  • No logs arriving: confirm network reachability from sources to log.pgnet.io and verify each component’s syslog setting.
  • TLS/cert errors: ensure time sync is correct and that the relevant trust chain is installed.
  • SSO problems: validate the identity broker config in Part 4 and confirm group mappings.