Symptoms:
GET https://{{ip}}/policy/api/v1/infra/settings/firewall/idfw/user-session-data
{
"active_user_sessions": [
{
"id": "########-####-####-####-############",
"domain_name": "IDFW",
"user_name": "user1",
"user_id": "",
"vm_ext_id": "########-####-####-####-############",
"user_session_id": 2,
"login_time": 1635850776234,
"logout_time": 0,
"session_source": "GI"
},
...
],
"dir_group_to_user_session_data_mappings": []
}
Log scrapper in not functioning correctly and is unable to return the events.
From the API call above we see the domain_name is upper case:
This is due to an issue in NSX-T 3.2.0 and 3.2.0.1 where the configured netbios name in NSX-T (case sensitivity) does not match that of the ldap server.
It should match the case from the result of the query run to return the netobios name from the ldap server.
Please review guide to see steps on finding the netbios name: Configuring Active Directory and Event Log Scraping