VMware’s vRealize Log Insight – The easy way to get datacenter insight

Posted by Michael Ryom on December 21, 2016
Share on Facebook0Share on Google+0Share on LinkedIn5Share on Reddit17Tweet about this on Twitter4
5/5 (2)

For those of you who do not know vRealize Log Insight. It is a log collector and analyzer, with a pretty, simple and intuitive GUI. An easy way of managing logs and messages from all your datacenter devices. Best of all, it is not a VMware only product! In that sense that as long as the message is in syslog format it can be ingest by Log Insight. Wait, that is not all. If the device does not support syslog, like a Windows server. The Log Insight agent you can install on the OS in question. The Log Insight agent can handle Windows event viewer messages and log files of any kind. So even applications that do not adhere to any of the normal ways of logging messages (like syslog or windows event viewer), can still be collected, by specifying the location and format of the log file(s).

VMware vRealize Log Insight

Lots of companies collect logs for one reason and one reason only. Compliance. I am not saying you should not do that, but if you only collect logs for the sole purpose of compliance, you are missing some great opportunities. This can be the differences between being proactive or reactive! The secret to how well your datacenter is run is in the logs and therefore Log Insight should be your gold standard for getting answers and preventing outage. There is more in there than meets the eyes.

vSphere problem events diagram

What is it that makes Log Insight such a great tool? In my book, it is the simplicity and the insight.

The simplicity in the sense that it is a very simple GUI and UX. Only two tabs. Dashboard and Interactive analytics. More important is extract fields. It is one of the core way you interact with Log Insight. The main pillar for creating context and dashboards. Without it, Log Insight would not be what it is. It is the simple idea of creating context in the messages that have been ingested by Log Insight. It is based on the use of regular expressions for creating a pre and post context to the field or data you want to extract. By extract I mean, make the field or data easily searchable or even better create filters based on the extracted fields and the value a given extract field holds.

Log Insight chart

The way you get started and extract a field, is simply by highlighting the data you want to have extracted. Log Insight then tries to create the regular expressions as best as it can for you. All you have to do is validate Log Insight has done a good job or correct it however you see fit.

In the screenshot three filters can be seen, the first field is a default field that comes with the default vSphere content pack. The last two is fields I have created simply by highlighting the text and giving it a name. It might not be obvious what these filters do, so I will explain them, to give you an idea of what can be achieved. The match rule for filters, is set to show data if ANY of the filters are true. Two of the filters only checks if the extract field exists. In the context here I am creating an audit trail of who has been logged in to an ESXi host via SSH and what they have done. This brings be to the last field. Appname. The appname filter uses a statement to validate if the extract field contains a certain value. In this case, the filter checks to see if the appname contains shell. The reason for this is that by getting any messages from shell, we can track what the user did and at what point in time. Very easy to setup and very powerful when audit trail is necessary. This could also be used to alert whenever a failed login attempt is tried against an ESXi host or whenever someone logs in as root instead of using AD credentials. If you want to read more about the use case I did a short blog post about it some time ago over at my blog. It is called vSphere audit trail with Log Insight and can be found here.

The extract fields and search methods can be saved as the widgets on a dashboard, which can be exported as a content packs. There in lays the sole power of Log Insight, the ability to share these structures across Log Insight installations. VMware has even build in a marketplace where content pack can be downloaded free of charge. This gives you instant access to knowledge about how a given system should be monitored, be it a Cisco ASA firewall, an Apache webserver or one of VMware’s own products such as vRA or NSX. Getting insight is at your fingertips.

What kind of insight can you then get? Well, that sort of depends on what the question is.

  • Do you want to know why your snapshot based backup is failing to take snapshots – Log Insight got the insight
  • Do you want to know if there are any ESXi related problems (see the pie chart) – Log Insight got the insight
  • Do you suspect there is a storage related issue – again Log Insight got you covered, with SCSI sense codes and errors
  • Want to see CPU or Memory failures before your hardware vendor declares the component is failing – You guessed it, Log Insight is the place to be

When you see that light, there is nothing Log Insight cannot give you answers to, because changes are that it is in the logs. The second best part of all of this is if you are using VMware products changes are that you have Log Insight for free included in your licenses somehow. For more details on licensing see here.

I hope this gave you a glimpse of what VMware’s vRealize Log Insight has to offer, you and your datacenter.

Related materials:





Views All Time
Views Today

Please rate this

To download the software products, please, make your choice below. An installer link and a license key will be sent to the e-mail address you’ve specified. If you consider StarWind Virtual SAN but are uncertain of the version, please check the following document Free vs. Paid. The recent build of Release Notes. A totally unrestricted NFR (Not For Resale) version of StarWind Virtual SAN is available for certain use cases. Learn more details here.

Return to all posts

How can you Leverage the Azure Security Center and the Vulnerability Assessment
[Docker] Image2Docker: Bye bye IIS on Windows Server, Hello IIS on Windows Containers
The following two tabs change content below.
Michael Ryom
Michael Ryom
Michael Ryom has over 10 years experience working with network, storage Windows, Linux and VMware technologies. His knowledge sharing as a blogger, public speaker and co-leader of the Danish vRops User Group has rewarded him the vExpert award three years in a row. He works for the Pan-European and US based, company Proact as a Cloud Architect on VMware solutions and automation, hybrid cloud and is an expert in vRops and Log Insight. Michael is certified VCP-DCV, VCP-NV, VCP-Cloud/CMA and VCAP-DCD.