Aviatrix Log Formats
The Aviatrix Controller and all of its managed gateways can be configured to forward their logs to well known log management systems. This section describes Aviatrix log keywords that can be identified by log management systems for further analysis.Aviatrix Log Keywords
The following types of Aviatrix log keywords can be identified by the Log Management System for further analysis:- AviatrixVPNSession
- AviatrixUser
- AviatrixLicenseVPNUsers
- AviatrixRule
- AviatrixGwMicroSegPacket
- AviatrixGwNetStats
- AviatrixGwSysStats
- AviatrixFQDNRule
- AviatrixTunnelStatusChange
- AviatrixCMD
- AviatrixBGPOverlapCIDR
- AviatrixBGPRouteLimitThreshold
- AviatrixGuardDuty
- AviatrixFireNet
- AviatrixVPNVersion
- AviatrixGatewayStatusChanged
AviatrixVPNSession
This log is for gateways that have VPN enabled. Logs with this prefix come from the Controller and contain information such as the VPN username, the VPN gateway IP address and name where the user connects to, client virtual IP address, connection duration, total received bytes, total transmitted bytes, and login and logout time. Two logs will be generated for each VPN connection. One is when the connection is established, the other when it is disconnected. Example logs: Connect Log:AviatrixUser
This log is for gateways that have VPN enabled. Logs with this prefix come from each VPN gateway managed by the Controller. The log contains the information for the TCP session, such as inbound and outbound interface, source IP address, destination IP address, TTL value, protocol name, and packet length. The log record is for each packet that passes through the VPN connection from the client to the destination. Two example logs:AviatrixLicenseVPNUsers
This log is for gateways that have VPN enabled. Logs with this prefix come from the Controller and can be used to monitor the license usage of active vpn users connected to all vpn gateways. One example log:AviatrixLicsenseVPNUsers instead of AviatrixLicenseVPNUsers.
AviatrixRule
You need to configure security policies to see AviatrixRule log. Logs with this prefix come from each gateway managed by the Controller. Any packet that triggers the security policy rule will generate a log record of this type with the first 100 bytes of the packet. It contains the information such as gateway IP address, inbound and outbound interface, MAC address, TTL value, protocol name, source IP address, destination IP address and packet length. An example for a deny rule event is shown below. The log event prefix is “AvxRl gw1 D:”, where the gateway name is gw1, “D” represents Drop.AviatrixGwMicroSegPacket
You need to configure Distributed Firewalling micro-segmentation policies to see AviatrixGwMicrosegPacket logs. Logs with this prefix come from your configured Distributed Firewalling micro-segmentation policies. These logs contain the following information:- timestamp
- source IP
- destination IP
- protocol (for example, ICMP or TCP)
- port number
- if a policy is enforced
- if a policy was allowed or denied
- gateway name
- policy ID