Hello everybody,
I'm currently trying to configure ESXi host to send logs to Splunk using Syslog as per configuration steps explained in the Splunk Documentation.
For my specific configuration, logs must be sent to a custom port on my Splunk Heavy forwarder; as explained in the Splunk guide: "To forward to a different port, create a new outbound firewall rule as another Security Profile on the sending host."
I tried adding a custom rule in the Syslog service section in the ESXi service.xml configuration file as reported below (UDP/TCP) but the solution is not working as expected (before checking i refreshed the firewall settings and reloaded the syslog service):
<rule id='1111>
<direction>outbound</direction>
<protocol>tcp</protocol>
<porttype>dst</porttype>
<port>11233</port>
</rule>
Disabling the ESXi firewall, logs are sent to Splunk as expected.
Also saw a guide that explained that is required to create a custom VIB with my custom rule but the vibauthor tool seems deprecated. From ESXi 7.0 service.xml conf file can't be modified anymore too.
Is there a conventional (and possibly guided) solution that allows to send logs to this custom Splunk port without disabling the entire ESXi firewall? Has anyone had the same issue?
Thank you for the attention