Forward Logs Externally
Configure remote syslog forwarding from day one. The 45-day in-UI retention is insufficient for most compliance frameworks and limits long-term trend analysis.
Logs are the audit trail and diagnostic backbone of every VergeOS environment. They record user-initiated actions, automated system events, hardware sensor readings, and replication activity — providing the evidence you need to troubleshoot issues, satisfy compliance requirements, and understand what happened and when.
VergeOS organizes logs into three distinct categories, each serving a different purpose and stored in a different location. Understanding these categories is essential for knowing where to look when diagnosing a problem and how to ensure long-term retention.
System logs are the primary log category in VergeOS. They capture activities related to vSAN operations, VM lifecycle events, network changes, user logins, configuration modifications, and other system-related operations. These logs are essential for understanding the detailed operations and performance of the entire environment.
Examples of system log entries include:
| Event Type | Example Log Entry |
|---|---|
| User authentication | IP address, username, login timestamp |
| Password changes | Which user changed which password, from which environment |
| VM operations | VM started, stopped, migrated, snapshot created |
| Storage events | Drive warnings, vSAN tier status changes, SMART alerts |
| Network events | Network created, firewall rule modified, NIC status change |
| System operations | Update downloaded, node rebooted, maintenance mode enabled |
System logs are accessible from the Main Dashboard (at the bottom of the page) or by selecting Logs from the top menu. Each log entry includes a level (Info, Warning, or Error), a timestamp, a source (e.g., node1, vSAN, admin), and a message describing the event.
Sync logs are specific to site sync (replication) operations. They are available on both incoming and outgoing sync dashboards and provide detailed statistics for each snapshot synchronization job:
Sync logs are invaluable for monitoring replication health, verifying that disaster recovery jobs are completing on schedule, and diagnosing bandwidth or performance issues with site-to-site synchronization.
The System Event Log (SEL) contains events from the hardware IPMI interface (Intelligent Platform Management Interface). Unlike system logs, the SEL is stored directly on the server’s BMC hardware, which means it has a limited and fixed capacity. Once the SEL is full, new events cannot be recorded until it is cleared.
The node dashboard displays a percentage bar indicating how much SEL capacity is currently used on each node. Common SEL entries include:
VergeOS retains system logs within the user interface for a maximum of 45 days. After this period, logs are automatically deleted from the UI. This retention window is sufficient for day-to-day troubleshooting and short-term auditing, but organizations with compliance requirements (HIPAA, SOC 2, PCI-DSS, etc.) will need to configure remote log forwarding to retain logs for longer periods.
One of the most practical features of VergeOS logging is context-specific log filtering. In many areas of the platform — such as an individual VM dashboard, a network dashboard, or a tenant dashboard — there is a Logs button that displays only the logs relevant to that specific object.
This scoping eliminates the need to manually search through thousands of system-wide log entries. For example:
Context-specific logs dramatically accelerate troubleshooting by narrowing the signal-to-noise ratio to exactly the object under investigation.
For organizations that require log retention beyond 45 days or need to integrate VergeOS logs into a centralized log management platform (Graylog, Splunk, Elastic Stack, Datadog, etc.), VergeOS supports remote syslog forwarding via standard syslog protocols.
Remote syslog forwarding is configured through Advanced Settings in the VergeOS UI:
syslog and press Enter to search| Protocol | Syntax | Example | Notes |
|---|---|---|---|
| TCP | @@<ip>:<port> | @@10.10.10.10:514 | Reliable delivery, recommended |
| UDP | @<ip>:<port> | @10.10.10.10:514 | Lower overhead, no delivery guarantee |
syslog again in the Advanced SettingsFor Graylog using RFC 5424 format:
GRAYLOGRFC5424,"<%PRI%>%PROTOCOL-VERSION% %TIMESTAMP:::date-rfc3339% %HOSTNAME%.your-hostname-here %APP-NAME% %PROCID% %MSGID% %STRUCTURED-DATA% %msg%\n"After completing the configuration, logs will begin forwarding to the specified syslog server. Check your remote server’s incoming logs to verify that VergeOS entries are being received successfully. Common verification steps:
Before configuring remote log forwarding, ensure the following:
Because the SEL has limited hardware capacity, it requires periodic maintenance to ensure new events can always be recorded.
The node dashboard displays a percentage bar showing the current SEL usage for each node. Monitor this indicator regularly — especially on older hardware that may generate more IPMI events.
When the SEL is nearing full capacity, clear it with the following procedure:
Some server hardware generates repetitive or benign IPMI events that clutter the SEL and the system logs. Common false positives include:
For persistent false-positive entries, VergeOS supports filtering via a hex-encoded syslog regex filter configured through the API. After applying the filter, restart the openipmi service to activate the change. Work with VergeOS support for guidance on implementing SEL filters specific to your hardware platform.
In addition to system logs and syslog forwarding, VergeOS provides SMTP delivery reports through the SMTP Dashboard (covered in the Subscriptions & Alerts page). These reports offer visibility into email delivery activity:
SMTP activity reports complement log management by providing a secondary verification channel — if you expect to receive an alert but do not, the SMTP log can reveal whether the message was queued, delivered, or rejected.
Forward Logs Externally
Configure remote syslog forwarding from day one. The 45-day in-UI retention is insufficient for most compliance frameworks and limits long-term trend analysis.
Monitor SEL Capacity
Check the SEL percentage bar on each node dashboard regularly. Clear the SEL before it reaches capacity to prevent loss of new hardware events.
Use Context-Specific Logs
When troubleshooting a specific VM, network, or tenant, use the context-specific Logs button on that object’s dashboard to filter out unrelated noise.
Establish Retention Policies
Define organizational retention requirements early. Use syslog forwarding to a centralized platform for long-term storage, search, and compliance auditing.
Three Log Types
System logs for operational events, Sync logs for replication activity, and SEL for hardware IPMI events. Each serves a distinct troubleshooting purpose.
45-Day UI Retention
VergeOS retains system logs for 45 days in the UI. Configure remote syslog forwarding for longer retention and compliance requirements.
Simple Syslog Setup
Two Advanced Settings fields — syslog server address and template format —
configure log forwarding for the entire environment. TCP (@@) for
reliability, UDP (@) for performance.
SEL Requires Maintenance
The hardware SEL has fixed capacity. Monitor the percentage bar on each node dashboard and clear the SEL proactively to prevent event loss.