Large number of syslog events are sent from SSP to the syslog server which leads to server slowness on syslog server
SSP 5.0
There is no log level based filtering while forwarding logs from SSP to the remote syslog server and log messages contain pod/container metadata. In addition, some components may log too frequently at INFO level, depending on scale.
k -n nsxi-platform get cm fluentd-aggregator-cm -o yaml > fluentd-aggregator-cm_original.yaml
k -n nsxi-platform edit cm fluentd-aggregator-cm
k -n nsxi-platform rollout restart statefulset fluentd
Note: Above example is from SSP 5.0 setup which has TCP remote syslog server configured. Same changes will work for UDP and TLS remote syslog server. Only the fluent plugin is different in case of TLS.
If Security Intelligence or NDR is deployed, and there are too many syslog events that contain the following pattern:
... RawflowCorrelationQuery - [CORRELATED/PARTIAL FLOW] ...
Increasing the log level in the flow ingestion pipeline may help mitigate the issue:
From SSPI cli , do the following:
1. k -n nsxi-platform edit cm rawflow-log4j-properties
2. Change the log level for 'logger.applogs.level' to warn
logger.applogs.name = com.vmware.nsx.pace
logger.applogs.level = info --------------------> Change from info to warn
3. k -n nsxi-platform delete pod spark-app-rawflow-driver
4. Wait for the spark-app-rawflow-driver and rawflowcorrelator-xxx pods to come up.
Note : This is fixed in SSP 5.1