ESXi Log Browser
The ESXi Log Browser is a quick and easy way to look at ESX/i logs collected from the host systems. Configure the forwarding of syslog data to Splunk App for VMware.browse the following log data:
- vCenter server vpxa agent logs (vpxa.log). These logs contain communication information with vCenter Server and the Host Management hostd agent.
- Syslog management service logs.
- hostd management service logs (hostd.log). The logs include virtual machine and host Task and Events information, information related to communication between the vSphere Client and the vpxa agent, and they store information about SDK connections.
Use the drop-down lists on the dashboard to filter your search results.
Field | Description |
---|---|
Time range | The time range over which events are reported. |
ESX/i | A list of ESX/i hosts from which you are collecting syslog data. The default value is All. |
Common Terms | Common terms that exist in ESX/i logs. This is a static list of options. HTTP and event are examples of common terms. The default value is Any. |
Field/Value | Common field values extracted at index time from events. This is a static list of options. The default value is Any. |
Error/Fault | Common errors of faults that appear in syslog data, classified into a single grouping. The default value is Any. |
Managed Objects | A list of all objects managed by the vCenter Server. The default value is All. |
API Related | TA list of all API related search terms that can appear in syslog data. The default value is All. |
Component | A list of all services running on the the vCenter server. The default value is All. |
Sublogger | A list of the log listener services installed. The default value is All. |
Look for | Enter the term that you want to specifically search for in the logs. |
Level | A logging level. This can be DEBUG, INFO, WARN, ERROR, or FATAL. |
Virtual Machine Snapshots | vCenter Log Browser |
This documentation applies to the following versions of Splunk® App for VMware (Legacy): 4.0.4
Feedback submitted, thanks!