ESX Firewall Change Notifications using VCF Logs & Operations Alerts
In fast-moving IT environments, visibility is key—especially when it comes to security. One area worth watching closely: ESX firewall configuration changes. These can be part of routine updates… or early signs of a security issue.
If you’re running VMware Cloud Foundation (VCF), there’s good news. You can automate firewall change monitoring using VCF Operations for Logs and VCF Operations Manager. In this post, I’ll walk you through setting up a smart alerting system that notifies your team the moment a change happens—via Slack, PagerDuty, email, or whatever channel keeps your ops team connected.
🛠 Step-by-Step: Creating a VCF Alert for ESX Firewall Changes
You’ll complete this in three steps:
✅ Step 1: Define the Trigger in VCF Operations for Logs
Start by creating an alert definition that watches for the log string:
esx.audit.net.firewall.config.changed
This string flags a firewall configuration change, therefore setup a real-time query which will catch these events.
Alert Configuration:
Name/Description: Include variables for clarity (e.g., ESX firewall changed on ${hostname})
Text Contains: esx.audit.net.firewall.config.changed
Frequency: Real-time (check every minute)
Forwarding: Send results to VCF Operations as Message Event
Recommendation: Add operator guidance like “Review host firewall settings in the vSphere client.”
🔔 Step 2: Create a Symptom Definition in VCF Operations Manager
Now define the condition VCF Operations Manager will use to trigger an alert.
Steps:
In the VCF Operations console, navigate to: Infrastructure Operations → Configurations → Symptom Definitions
Go to the Message Event tab
Set Base Object Type to: Host System
Drag Notification Event Type into the center pane
Symptom Configuration:
Name: ESX firewall changed on ${hostname}
Condition: Use the Contains operator with: ESX firewall changed on ${hostname}
Trigger Level: Critical
This becomes the core of your alert logic.
🚨 Step 3: Build the Final Alert Definition
With your trigger and symptom defined, build the final alert.
Steps:
Navigate to: Infrastructure Operations → Configurations → Alert Definitions
Click Add to create a new alert
Alert Configuration Steps:
Name & Description – I kept this consistent:ESX firewall changed on ${hostname}
Symptoms/Conditions – In the right window, select Symptoms and make sure to choose Message Event from the dropdown. Search for the item that was created in step 2 and drag that entry into the center pane.
Complete the Recommendations and Policy attachment sections.
⚠️ Avoid using the Default Policy—it may be overwritten during upgrades
✅ Create and use a custom policy for persistence
📣 Get Notified Where It Matters
Once the alert is live, route notifications through your preferred systems:
PagerDuty – for incident escalation
Slack – for team visibility and fast response
Email – for audit tracking
Your team stays informed—whether it’s routine or something suspicious.
✨ Wrapping Up
Proactive security starts with awareness. With this alerting setup in VCF, you’re not just reacting—you’re staying one step ahead.
Leave a comment