How to read and filter NSX-T logs
Objective
This guide explains how to extract and analyze key information from NSX-T logs to troubleshoot blocked traffic or monitor firewall activity on your Hosted Private Cloud.
Requirements
- Access to the vSphere interface
- Access to the OVHcloud Control Panel with NSX-T enabled, or to your Syslog/log aggregation system
- Basic understanding of NSX-T firewalling and network traffic
Instructions
Step 1: Identify useful log fields
When inspecting logs, focus on the following elements:
| Field | Description |
|---|---|
| Timestamp | Time when the event occurred |
| Action | Whether traffic was allowed or dropped (ALLOW or DROP) |
| Rule ID | ID of the NSX-T rule that matched the traffic |
| Source IP | Origin IP address |
| Destination IP | Target IP address |
| Protocol | Protocol used such as TCP, UDP, or ICMP |
The mentioned fields are usually sufficient to identify the most common connectivity issues.
Optional: Source and destination ports can help identify application specific issues.
Step 2: Access the logs from a Syslog server
If NSX-T is configured to forward logs externally:
- Connect to your Syslog or log aggregation platform
- Filter entries using fields such as
DROP,ruleId,src,dst,proto, ordport
Example log lines:
Step 3: Filter and analyze logs
Depending on your toolchain:
- Use
Log Insightto create filters and dashboards - In tools like Graylog, ELK, or Splunk, build queries to focus on dropped traffic or specific rule IDs
- From CLI exports, filter using:
Advanced: Improving readability in Graylog
To make NSX-T firewall logs easier to read and closer to the simplicity of NSX-V format, you can configure Graylog extractors and dashboards:
-
Create a dedicated input stream
Configure a Graylog stream to capture only NSX-T firewall logs (
facility=local6andcomp="nsx-edge") to isolate them from other system messages. -
Normalize timestamps and hosts
Use Graylog extractors to clean the raw syslog format, keeping only the event timestamp (e.g.
2024-03-18T06:29:50.837Z) and source hostname (e.g.edge27-857b.rbx1a.pcc.ovh.net). -
Parse firewall action and rule ID
Apply a Grok or regex extractor to split entries such as
INET TERM PASS 2025 OUT TCPinto structured fields:Action = PASS / DROPRule ID = 2025Direction = OUTProtocol = TCP
-
Extract source and destination fields
Parse the IPs and ports (e.g.
10.216.242.234/61790 -> 10.216.240.19/3128) into structured Graylog fields:src_ip,src_portdst_ip,dst_port
-
Drop useless metadata
Remove verbose attributes such as
[nsx@6876 comp="nsx-edge" ...]that do not help troubleshooting. This keeps logs leaner and more readable. -
Build a simplified log view/dashboard
Create a Graylog dashboard showing only the essential fields (Date, Action, Rule ID, Source, Destination, Protocol).
This replicates the clarity of NSX-V logs and speeds up troubleshooting.
Go further
If you require training or technical assistance in implementing our solutions, contact your sales representative or click here for a quote and request a custom analysis of your project from our Professional Services team experts.
Ask questions, give your feedback and interact directly with the team building our Hosted Private Cloud services on the dedicated Discord channel.
Join our community of users.