6.0.3

Table Of Contents
ESXi Log File Locations
ESXi records host activity in log les, using a syslog facility.
Component Location Purpose
VMkernel
/var/log/vmkernel.log
Records activities related to virtual
machines and ESXi.
VMkernel warnings
/var/log/vmkwarning.log
Records activities related to virtual
machines.
VMkernel summary
/var/log/vmksummary.log
Used to determine uptime and
availability statistics for ESXi (comma
separated).
ESXi host agent log
/var/log/hostd.log
Contains information about the agent
that manages and congures the ESXi
host and its virtual machines.
vCenter agent log
/var/log/vpxa.log
Contains information about the agent
that communicates with vCenter
Server (if the host is managed by
vCenter Server).
Shell log
/var/log/shell.log
Contains a record of all commands
typed into the ESXi Shell as well as
shell events (for example, when the
shell was enabled).
Authentication
/var/log/auth.log
Contains all events related to
authentication for the local system.
System messages
/var/log/syslog.log
Contains all general log messages and
can be used for troubleshooting. This
information was formerly located in
the messages log le.
Virtual machines The same directory as the aected
virtual machine's conguration les,
named vmware.log and vmware*.log.
For
example, /vmfs/volumes/datastor
e/virtual machine/vwmare.log
Contains virtual machine power
events, system failure information,
tools status and activity, time sync,
virtual hardware changes, vMotion
migrations, machine clones, and so on.
Securing Fault Tolerance Logging Traffic
When you enable Fault Tolerance (FT), VMware vLockstep captures inputs and events that occur on a
Primary VM and sends them to the Secondary VM, which is running on another host.
This logging trac between the Primary and Secondary VMs is unencrypted and contains guest network
and storage I/O data, as well as the memory contents of the guest operating system. This trac can include
sensitive data such as passwords in plaintext. To avoid such data being divulged, ensure that this network is
secured, especially to avoid "man-in-the-middle" aacks. For example, use a private network for FT logging
trac.
vSphere Security
208 VMware, Inc.