I did enable logging o nthe rule, turns out that the issue was vRLI related. Even though the vCenter integration was in place and all hosts seemed to be configured, some were not sending data to ...
See more...
I did enable logging o nthe rule, turns out that the issue was vRLI related. Even though the vCenter integration was in place and all hosts seemed to be configured, some were not sending data to Log Insight. I had to unconfigure all hosts and configure the again from Log Insight. After that the hosts started sendign data and the reject events are visible. So it works basically just like in NSX-V. What I find interesting ist, that yesterday when checking the NSX-T Manager as the log source following event were logged: nsx-manager NSX 31382 FIREWALL [nsx@6876 audit="true" comp="nsx-manager" entId="edb7d290-06c3-47aa-865a-643c351afd44" level="INFO" reqId="1ad3e007-843f-4396-bae5-08b7e34e5b6c" splitId="AYmIpooH" splitIndex="3 of 4" subcomp="manager" username="admin" ] "f58fe46b-37cf-4258-993d-26a21da892d2", "target_display_name": "xxx/xxx@xxx", "target_type": "LogicalPort", "is_valid": true }, { "target_id": "ip", "target_display_name": "ip", "target_type": "IPAddress", "is_valid": true } ], "destinations": [ { "target_id": "yyy", "target_display_name": "yyy/yyy@yyy", "target_type": "LogicalPort", "is_valid": true } ], "rule_tag": "rejectTest", "action": "REJECT", "disabled": false, "logged": true, "direction": "IN_OUT", "ip_protocol": "IPV4_IPV6", "is_default": false, "_revision": 3 } ], "resource_type": "FirewallSection", "id": "zzz", "display_name": "zzz", "section_type": "LAYER3", "stateful": true, "rule_count": 1, "is_default": false, "locked": false, "comments": "Default section unlock comment", "lock_modified_by": "admin", "lock_modified_time": Basically, the whole rule is returned, but only the elements wihch are relevant to the reject action are shown. So it seems that (some of) the events are kept on the manager anyway.