This content Pack is only intended for Security Monitoring.
If you noticed some data about security that is not parsed, you can open an issue and I will update the Content Pack.
Tested with VMWARE vSphere 8.0.2 and ESXI 8.0.0 and Graylog 5.2.0.
The Content Pack should be compatible with all Graylog 5.X version.
Note this was built without extractors, only pipeline rules.
1 Input (Syslog/TCP/1515 for VCSA)
1 Streams (VCSA)
Pipeline Rule w/ Stages (Extract key/values pipeline function)
Dashboards (24h) (VCSA ComponentS) + VCenter (SSO Activities / VM Activities)
1 Input (Syslog/TCP/1514 for ESXI)
1 Stream (ESXI)
Pipeline Rule w/ Stages (Extract key/values pipeline function)
Dashboards (24h) (ESXI Components) + ESXI (SSO Activities / VM Activities)
source:vcsa
with source:your_vcsa_dns_name
(check the raw logs of the VCSA input if you are not sure)source:esxi*.lab.lan
with source:your_esxis_hostname*.domain_name
esxi[0-9]\\.lab\\.lan
with esxi[0-9]\\.your\\.domain
where esxi[0-9] is the name of the one I have (exsi1, esxi2 etc), adapt according to your confGo to System > Content Pack > Upload (Drag and drop file or Select) Then click install,
I recommend you to create a specific Indice for VCSA and one for ESXI, and apply the VCSA/ESXI Stream to it.
Go to Syslog > Edit
https://your_esxi_ip/ui/#/host/manage/system/advanced-settings
Select your esxi > Manage > System > Advanced Settings > On the top right, filter with syslog > Click on the line Syslog.global.logHost and Edit it:
tcp://192.168.1.51:1514?formatter=RFC_5424
YOU NEED TO CHOSE RFC_5424, not the default one.
I did not find how to parse VCenter splitted message in two parts, see this thread: https://community.graylog.org/t/pipeline-rules-for-messages-splitted-in-2-or-more-parts/30511/5