Ask questions. Get answers. Find technical product solutions from passionate experts in the NXLog community.

Windows Event Logs filter by Account Name
Hi guys, I must forwarding some logs, but only of some users. this's my current configuration. Panic Soft #NoFreeOnExit TRUE define ROOT C:\Program Files (x86)\nxlog define CERTDIR %ROOT%\cert define CONFDIR %ROOT%\conf define LOGDIR %ROOT%\data define LOGFILE %LOGDIR%\nxlog.log LogFile %LOGFILE% Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data <Extension _syslog> Module xm_syslog </Extension> <Extension _charconv> Module xm_charconv AutodetectCharsets iso8859-2, utf-8, utf-16, utf-32 </Extension> <Extension _exec> Module xm_exec </Extension> <Extension _fileop> Module xm_fileop # Check the size of our log file hourly, rotate if larger than 5MB &lt;Schedule&gt; Every 1 hour Exec if (file_exists('%LOGFILE%') and \ (file_size('%LOGFILE%') &gt;= 5M)) \ file_cycle('%LOGFILE%', 8); &lt;/Schedule&gt; # Rotate our log file every week on Sunday at midnight &lt;Schedule&gt; When @weekly Exec if file_exists('%LOGFILE%') file_cycle('%LOGFILE%', 8); &lt;/Schedule&gt; </Extension> <Input eventlog> Module im_msvistalog <QueryXML> <QueryList> <Query Id='0'> <Select Path='Security'>*[System[(EventID=4720 or EventID=4634 or EventID=4625 or EventID=4624 or EventID=4726)]]</Select> </Query> </QueryList> </QueryXML> Exec $Message = 'EventID: ' + $EventID +' Source: '+ $IpAddress + ' Username: ' + $TargetUserName ; </Input> <Output tcp> Module om_udp Host xx.xxx.xx.xxx Port xxx Exec to_syslog_bsd(); </Output> <Route eventlog_to_tcp> Path eventlog => tcp </Route> can you help me? thank you

Emanuele created
Replies: 1
View post »
last updated
Splunk Message parsing
Hello, After looking on the community forum i didn't really get the answer i was seeking. I'm sending windows log to a syslog and to a splunk, I got some issue about parsing the Message part as you can see : https://cdn.discordapp.com/attachments/700242491227635714/766300884971159562/unknown.png This is my conf : https://cdn.discordapp.com/attachments/700242491227635714/766301478897451048/unknown.png https://cdn.discordapp.com/attachments/700242491227635714/766301597541335060/unknown.png Maybe this is not the good way to do it, i have to send in syslog because i'm sending it after to an elasticsearch and the splunk. Thank you for your help :)

MB_318874 created
Replies: 1
View post »
last updated
Formatting a line output in a file
Hello In the end I have to come to you because I can't find the way to do it and I'm going a bit crazy. I have a record entry from a file. This file sends the data in a disorderly way and I have managed to assign it to variables. Now the only thing I want is to create an output in a file but with the order I need. EJ of log entry : user1 2020 barcelona 12 13:39 12 spaghetti And I want an exit like Place: <variable of place> , Date: <variable of date> , Age :<variable of age> To generate a line like this : Place : barcelona , Date : 2020 , Age : 12 .... This is my config. <Input LOG_IN> Module im_file File "C:\logs\u_ex*" SavePos TRUE <Exec> if $raw_event =~ /(.?)\s"(.?)"\s"(.?)"\s(.?)\s(.?)\s(.?)\s"(.?)"\s"(.?)"\s(.?)\s(.?)\s(.?)\s"(.?)"\s"(.?)"\s(.?)\s(.?)\s"(.?)"/; { $a = $1; $b = $2; $c = $3; $d = $4; $e = $5; $f = $6; $g = $7; $h = $8; $i = $9; $j = $10; $k = $11; $l = $12; $m = $13; $n = $14; $o = $15; $p = $16; } </Exec> </Input> <Output file> Module om_file File "C:\logs\output.log" </Output>

JM_782883 created
Replies: 1
View post »
last updated
No data in Graylog
Hi. I'm new to both Graylog and NxLog. I am getting the following errors when trying to add inputs. 2020-10-14 11:48:27 WARNING stopping nxlog service 2020-10-14 11:48:27 WARNING nxlog-ce received a termination request signal, exiting... 2020-10-14 11:48:28 ERROR invalid keyword: Output at C:\Program Files (x86)\nxlog\conf\nxlog.conf:66 2020-10-14 11:48:28 ERROR module 'graylog' has configuration errors, not adding to route 'graylog_route' at C:\Program Files (x86)\nxlog\conf\nxlog.conf:70 2020-10-14 11:48:28 ERROR route graylog_route is not functional without output modules, ignored at C:\Program Files (x86)\nxlog\conf\nxlog.conf:70 2020-10-14 11:48:28 WARNING no routes defined! 2020-10-14 11:48:28 WARNING not starting unused module win 2020-10-14 11:48:28 WARNING not starting unused module graylog 2020-10-14 11:48:28 INFO nxlog-ce-2.10.2150 started I added the following lines to my config file <Extension _gelf> Module xm_gelf </Extension> <Input win> Module im_msvistalog Query <QueryList> <Query Id="0"> <Select Path="Application"></Select> <Select Path="System"></Select> <Select Path="Security">*</Select> </Query> </QueryList> </Input> <Output graylog> Module om_udp host 172.16.101.33 Port 12201 Output Type GELF </Output> <Route graylog_route> Path win => graylog </Route> Any help is appreciated.

ZE_043114 created
Replies: 1
View post »
last updated
NXLog cannot assign requested address
In my design, there are collectors placed in security zones, receiving logs from a great number of Linux servers and forwarding the incoming to a Master Collector. This works perfectly fine :) My Collector's Input is defined like: <Extension _syslog> Module xm_syslog </Extension> <Input in1> Module im_tcp Host 0.0.0.0 Port 514 Exec parse_syslog(); </Input> but with one exception: In one of the zones I'm supposed to receive logs from the firewall - I can see in the nxlog.log the connection is accepted, but then it says connection accepted from [X.X.X:X]:port couldn't bind tcp socket to [X.X.X.X]:514; cannot assign requested address and I don't get any firewall logs. What is the proper fix for this?

DS_534595 created
Replies: 2
View post »
last updated
Understanding "Exec" filtering syntax
I am trying to filter certain Windows Server events. I have the following code: <Exec> if $EventID == '4737' AND $TargetSid == 'S-1-5-21-3629192509-3943823860-1568066966-20147' AND $SubjectUserSid == 'S-1-5-21-3629192509-3943823860-1568066966-20118' { drop(); } if $SubjectUserName == 'NETVAULT$' AND $SubjectUserSid == 'S-1-5-20' AND ($ProcessName == 'C:\Program Files (x86)\Quest\NetVault Backup\pgsql\bin\postgres.exe' OR $NewProcessName == 'C:\Program Files (x86)\Quest\NetVault Backup\pgsql\bin\postgres.exe') { drop(); } if $SubjectUserName == 'HVAC$' AND $SubjectUserSid == 'S-1-5-18' AND ($ProcessName == 'C:\Program Files (x86)\Delta Controls\enteliWEB\PostgreSQL\bin\postgres.exe' OR $NewProcessName == 'C:\Program Files (x86)\Delta Controls\enteliWEB\PostgreSQL\bin\postgres.exe') { drop(); } </Exec> The first one says if the EventID, TargetSid, and SubjectUserSid are certain values, then drop the event. The second says that if the SubjectUserName and SubjectUserSid are certain values and either the ProcessName or NewProcessName are a certain value, then drop the event. The third basically is doing the same thing as the second one, except using different values. Do I have the syntax correct for this?

JF_427179 created
Replies: 1
View post »
last updated
Where does the < 14 > come from?
Hi, we are using NXlog to forward syslog messages, which works fine. But we have that strange <14> in the forwarded message: 3.127.197.211 **<14>**2020-10-13 09:58:54,443 message Konfig: <Input syslog514udp> Module im_udp Port 514 Host 0.0.0.0 </Input> <Output eventsentry> Module om_udp Host dstserver.domain.com Port 514 Exec $raw_event = $MessageSourceAddress + " " + $raw_event; </Output> Does anyone know why that happens? Thanks, Thomas

TK_276781 created
Replies: 1
View post »
last updated
nxlog ce not to log server
hello i have i question about windows 2012 > nxlog ce > graylog my nxlog-ce ver is 2.10.2150 question : my nxlog-ce to graylog have question but the log is not go to graylog so im open windows taskmgr to see nxlog.exe PID and Internet connection nxlog source ip and Destination is "ipv4 Loopback " 2.nxlog log : WARNING The following sources are omitted to avoid exceeding the limit in the generated query: Microsoft-Windows-Workplace Join/Admin Microsoft-Windows-WPD-ClassInstaller/Operational Microsoft-Windows-WPD-CompositeClassDriver/Operational Microsoft-Windows-WPD-MTPClassDriver/Operational Microsoft-WS-Licensing/Admin Setup WitnessClientAdmin my nxlog.conf Panic Soft #NoFreeOnExit TRUE define ROOT C:\Program Files (x86)\nxlog define CERTDIR %ROOT%\cert define CONFDIR %ROOT%\conf define LOGDIR %ROOT%\data define LOGFILE %LOGDIR%\nxlog.log LogFile %LOGFILE% Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data <Extension _syslog> Module xm_gelf </Extension> <Input in> Module im_msvistalog </Input> <Output out> Module om_udp Host Port 10554 OutputType GELF </Output> <Route 1> Path in => out </Route> so how can i do to Solve the problem please help me thx~~

lokeliu created
Replies: 6
View post »
last updated
NXLog seems to forward some older events but not new ones
Our setup: we have Windows Server 2019 servers that are forwarding some "Security" events to a single Windows Server 2019 event collector. On that single Windows Server 2019 event collector, we have installed NXLog, which is forwarding to Graylog. Summary: servers --> event collector server (where NXLog is installed) --> Graylog server All selected events are getting to the event collector, but only some are getting to Graylog. So the problem is somewhere on or after the event collector server. Here is the complete NXLog config: define ROOT C:\Program Files (x86)\nxlog Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data LogFile %ROOT%\data\nxlog.log <Extension _gelf> Module xm_gelf ShortMessageLength 500 </Extension> <Input in> Module im_msvistalog <QueryXML> <QueryList> <Query Id='0'> <Select Path='ForwardedEvents'>*</Select> </Query> </QueryList> </QueryXML> </Input> <Output out> Module om_tcp Host graylog.local Port 12201 OutputType GELF_TCP </Output> <Route 1> Path in => out </Route> Is anything obvious missing?

JF_427179 created
Replies: 1
View post »
last updated
How to fetch logs recursively, when the files may have a number of different file extensions?
I traverse /var/log/myAPPLICATION* like shown below to harvest everything below in the folder structure, which has .log as extension. The challenge is now: What if there are occurences of logfiles that have e.g. .txt extension? Is it possible to use some conditional to that File line in the Input directive? Something like File "/var/log/myAPPLICATION/*.[log|txt]" <Input appLogs> Module im_file File "/var/log/myAPPLICATION/*.log" Recursive True SavePos True ReadFromLast True Exec to_syslog_ietf(); </Input>

DS_534595 created
Replies: 1
View post »
last updated
Can anyone share experience/configs for nxlog community edition to forward security and authentication events from RHEL 7.x servers ?
We have installed nxlog community edition on Red Hat Enterprise Linux version 7.6. We included auth.conf but are not seeing any auth messages forwarded. I'm not understanding why Rsyslog is required since Rsyslog is capable for forwarding events by itself. Please share configs and experiences getting security and auth messages to forward.

sschomer created
Replies: 1
View post »
last updated
Different ProcessID field values ​​in sysmon event
Hello! I noticed that the value of the ProcessID field in sysmon event does not match the value of the ProcessID field which is nested in the Message field. Is it normal? The sample sysmon event from https://nxlog.co/documentation/nxlog-user-guide/sysmon.html is bellow { "EventTime": "2015-04-27 15:23:46", "Hostname": "WIN-OUNNPISDHIG", "Keywords": -9223372036854776000, "EventType": "INFO", "SeverityValue": 2, "Severity": "INFO", "EventID": 1, "SourceName": "Microsoft-Windows-Sysmon", "ProviderGuid": "{5770385F-C22A-43E0-BF4C-06F5698FFBD9}", "Version": 3, "Task": 1, "OpcodeValue": 0, "RecordNumber": 2335906, "ProcessID": 1680, "ThreadID": 1728, "Channel": "Microsoft-Windows-Sysmon/Operational", "Domain": "NT AUTHORITY", "AccountName": "SYSTEM", "UserID": "SYSTEM", "AccountType": "Well Known Group", "Message": "Process Create:\r\nUtcTime: 2015.04.27. 13:23\r\nProcessGuid: {00000000-3862-553E-0000-001051D40527}\r\nProcessId: 25848\r\nImage: c:\\Program Files (x86)\\nxlog\\nxlog.exe\r\nCommandLine: \"c:\\Program Files (x86)\\nxlog\\nxlog.exe\" -f\r\nUser: WIN-OUNNPISDHIG\\Administrator\r\nLogonGuid: {00000000-568E-5453-0000-0020D5ED0400}\r\nLogonId: 0x4edd5\r\nTerminalSessionId: 2\r\nIntegrityLevel: High\r\nHashType: SHA1\r\nHash: 1DCE4B0F24C40473CE7B2C57EB4F7E9E3E14BF94\r\nParentProcessGuid: {00000000-3862-553E-0000-001088D30527}\r\nParentProcessId: 26544\r\nParentImage: C:\\msys\\1.0\\bin\\sh.exe\r\nParentCommandLine: C:\\msys\\1.0\\bin\\sh.exe", "Opcode": "Info", "UtcTime": "2015.04.27. 13:23", "ProcessGuid": "{00000000-3862-553E-0000-001051D40527}", "Image": "c:\\Program Files (x86)\\nxlog\\nxlog.exe", "CommandLine": "\"c:\\Program Files (x86)\\nxlog\\nxlog.exe\" -f", "User": "WIN-OUNNPISDHIG\\Administrator", "LogonGuid": "{00000000-568E-5453-0000-0020D5ED0400}", "LogonId": "0x4edd5", "TerminalSessionId": "2", "IntegrityLevel": "High", "HashType": "SHA1", "Hash": "1DCE4B0F24C40473CE7B2C57EB4F7E9E3E14BF94", "ParentProcessGuid": "{00000000-3862-553E-0000-001088D30527}", "ParentProcessId": "26544", "ParentImage": "C:\\msys\\1.0\\bin\\sh.exe", "ParentCommandLine": "C:\\msys\\1.0\\bin\\sh.exe", "EventReceivedTime": "2015-04-27 15:23:47", "SourceModuleName": "in", "SourceModuleType": "im_msvistalog" }

Alexander created
Replies: 1
View post »
last updated
om_python Module
Hi - pardon my ignorance I would like to use the om_python module to run a Python script s3_write.py which outputs to an S3 bucket on AWS I noticed the module wasn't included on the Community edition so I downloaded a trial of Enterprise and installed it, but im_python and om_python are not included with that either Nor can I find anywhere to download that module. How can I get hold of om_python please ? Kind regards

SD_119859 created
Replies: 1
View post »
last updated
Windows server 2008sp2
Installing nxlog to a 2008sp2 server. There is no C:\program files (x86) directory. Only Program Files. The service won't start because it is unable to find the program files (x86) directory. Are there other steps that need to be done to get this to work?

BS_816201 created
Replies: 1
View post »
last updated
Windows serveur 2019 and NXLOG-CE 2.10.21.50
hello, Windows serveur 2019 NXLOG-CE 2.10.21.50 i have difficulties to transfert Windows 2016/2019 sercurity logs to a Syslog host. i think that my nxlog.conf is not working right, sometimes i receive the logs some time not can you help me please ? ############### define ROOT C:\Program Files (x86)\nxlog Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data LogFile %ROOT%\data\nxlog.log <Extension _syslog> Module xm_syslog </Extension> <Extension _charconv> Module xm_charconv AutodetectCharsets iso8859-2, utf-8, utf-16, utf-32 </Extension> <Extension _exec> Module xm_exec </Extension> <Extension _json> Module xm_json </Extension> <Input in_eventlog> # For windows 2008/vista/7/8/2012/2012R2 and latter use the following: Module im_msvistalog Query <QueryList> <Query Id="0"> <Select Path="Security">[System[(EventID=1100)]]</Select> <Select Path="Security">[System[(EventID=4768)]]</Select> <Select Path="Security">[System[(EventID=4769)]]</Select> <Select Path="Security">[System[(EventID=4771)]]</Select> <Select Path="Security">[System[(EventID=4616)]]</Select> <Select Path="Security">[System[(EventID=4625)]]</Select> <Select Path="Security">[System[(EventID=4647)]]</Select> <Select Path="Security">[System[(EventID=4648)]]</Select> <Select Path="Security">[System[(EventID=4656)]]</Select> <Select Path="Security">[System[(EventID=4719)]]</Select> <Select Path="Security">[System[(EventID=4720)]]</Select> <Select Path="Security">[System[(EventID=4722)]]</Select> <Select Path="Security">[System[(EventID=4723)]]</Select> <Select Path="Security">[System[(EventID=4724)]]</Select> <Select Path="Security">[System[(EventID=4725)]]</Select> <Select Path="Security">[System[(EventID=4726)]]</Select> <Select Path="Security">[System[(EventID=4727)]]</Select> <Select Path="Security">[System[(EventID=4728)]]</Select> <Select Path="Security">[System[(EventID=4729)]]</Select> <Select Path="Security">[System[(EventID=4730)]]</Select> <Select Path="Security">[System[(EventID=4731)]]</Select> <Select Path="Security">[System[(EventID=4732)]]</Select> <Select Path="Security">[System[(EventID=4733)]]</Select> <Select Path="Security">[System[(EventID=4734)]]</Select> <Select Path="Security">[System[(EventID=4735)]]</Select> <Select Path="Security">[System[(EventID=4737)]]</Select> <Select Path="Security">[System[(EventID=4738)]]</Select> <Select Path="Security">[System[(EventID=4739)]]</Select> <Select Path="Security">[System[(EventID=4740)]]</Select> <Select Path="Security">[System[(EventID=4741)]]</Select> <Select Path="Security">[System[(EventID=4742)]]</Select> <Select Path="Security">[System[(EventID=4743)]]</Select> <Select Path="Security">[System[(EventID=4744)]]</Select> <Select Path="Security">[System[(EventID=4745)]]</Select> <Select Path="Security">[System[(EventID=4748)]]</Select> <Select Path="Security">[System[(EventID=4749)]]</Select> <Select Path="Security">[System[(EventID=4750)]]</Select> <Select Path="Security">[System[(EventID=4753)]]</Select> <Select Path="Security">[System[(EventID=4754)]]</Select> <Select Path="Security">[System[(EventID=4755)]]</Select> <Select Path="Security">[System[(EventID=4756)]]</Select> <Select Path="Security">[System[(EventID=4758)]]</Select> <Select Path="Security">[System[(EventID=4759)]]</Select> <Select Path="Security">[System[(EventID=4760)]]</Select> <Select Path="Security">[System[(EventID=4763)]]</Select> <Select Path="Security">[System[(EventID=4764)]]</Select> <Select Path="Security">[System[(EventID=4767)]]</Select> <Select Path="Security">[System[(EventID=4778)]]</Select> <Select Path="Security">[System[(EventID=4783)]]</Select> <Select Path="Security">[System[(EventID=4800)]]</Select> <Select Path="Security">[System[(EventID=4801)]]</Select> <Select Path="System">[System[(EventID=7036)]]</Select> <Select Path="Application">[System[(EventID=18454)]]</Select> <Select Path="Application">[System[(EventID=18456)]]</Select> </Query> </QueryList> Exec $Message=to_json(); # to_syslog_bsd(); # Exec $ModuleType = 'event_log'; # ReadFromLast TRUE </Input> <Output out_eventlog> Module om_udp Host xx.xx.xx.xx #Port 514 Exec to_syslog_bsd(); </Output> <Route eventlog> Path in_eventlog => out_eventlog </Route> #####################################

Ahmed.MEZRAG created
NXLOG-CE for windows server 2019
hello, first of all I would like to know is NXLOG-CE compatible with Windows server 2019. I have a lot of trouble implementing nxlog-ce on windows 2019 while on 2012 every thing is fine. the logs do not go up instantly and most of the time it does not work. someone has used nxlog-ce on windows 2019 ? sorry for my English :) Thank you for your answers with frensh : tout d'abord je souhaite savoir est ce que NXLOG-CE est compatible avec Windows serveur 2019. j'ai beaucoup de mal a implémenter nxlog-ce sur windows 2019 alors que sur de 2012 tout est bien fonctionnel et aucun soucis pour fare remonter les logs vers mon Syslog (kiwisyslog de solarwinds). les logs ne remontent pas instantanément et la majorité du temps cela ne fonctionne même pas. quelqu'un a t-il déjà utilisé nxlog-ce sur du windows 2019. merci pour vos réponses

Ahmed.MEZRAG created
Replies: 3
View post »
last updated
Basic Setup
Have created this simple agent to send agent logs to a central server. Is it possible to bulk this and only send once per hour ? What requirements to use the same as agentless ? When I add a second agent, how does the NXlog server separate the logs ? I then want to forward all logs on NXlog server to SIEM or Elastic , how to forward ? possible to bult this aswell <Input syslog> Module im_msvistalog <QueryXML> <QueryList> <Query Id='0'><Select Path='System'>[System[(Level &lt;= 3)]]</Select></Query> <Query Id='1'><Select Path='Application'>[System[(Level &lt;= 3)]]</Select></Query> <Query Id='2'><Select Path='Security'>*[System[(Level &lt;= 3)]]</Select></Query> </QueryList> </QueryXML> </Input> <Output forward> Module om_tcp Host x.x.x.x Port 1514 </Output> #################### ROUTE ########### <Route r> Path syslog => forward </Route>

NF_862205 created
Replies: 1
View post »
last updated
Using a domain user for om_file export
Hi! I was wondering if anyone had any thoughts on this. I am using NXLog CE on Windows. I want to use om_file to export a log file to a network share folder. This share only allows AD domain users to read/write to the network share folder. I found that when I try to do this I get permission denied. This is obviously because I haven't assigned a domain account for NXLog to use, and I assume NXLog uses a local system account. Is there a way I can make NXLog use Domain credentials when doing this file transfer? Or is there another output module I should use? I am new to NXLog, apologies if this is a simple answer :)

MP_286983 created
Replies: 1
View post »
last updated
im_msvistalog multiple filters
Hello, I have to filter multiple log (such as System, Application) and also filter it by levels. I'm trying to wrote a config but don't output anything. <Input eventlog> Module im_msvistalog <QueryXML> <QueryList> <Query Id='0'> <Select Path="System">[System[(EventID=11150 or EventID=11151 or EventID=11152 or EventID=11153 or EventID=11154 or EventID=11155 or EventID=11162 or EventID=11163 or EventID=11164 or EventID=11165 or EventID=11166 or EventID=11167 or EventID=5773 or EventID=5774)]]</Select> <Select Path='System'>[System/Level=2]</Select> <Select Path="System">[System[(Level=2 or Level=4)][(EventID=6005 or EventID=6008)]]</Select> <Select Path="System">[System/Level=4[(EventID=6005 or EventID=6008)]]</Select>s <Select Path="System">[System/Level=3[(EventID=1031 or EventID=1053 or EventID=5053 or EventID=1129 or EventID=1131 or EventID=1135 or EventID=1206 or EventID=1211 or EventID=1216 or EventID=1553 or EventID=5553 or EventID=2057 or EventID=47 or EventID=16947 or EventID=16949 or EventID=4034 or EventID=9015 or EventID=9026)]]</Select> <Select Path="Application">[System/Level=2]</Select> <Select Path="Application">*[System/Level=3[(EventID=514)]]</Select> </QueryList> </QueryXML> I don't know if is the right way, it's my first time with nxlog. Thanks a lot!

LP_577584 created
Replies: 1
View post »
last updated
IPv6 support in Nxlog-CE
Dear all, I was wondering if there was IPv6 support in the latest nxlog-community edition release? According to the Documentation (NXLog Community Edition Reference Manual) it seems IPv6 is supported. IPv6 Address An ip6addr type stores an IPv6 address in an internal format. But according to my nxlog.log errors I see the following: 2020-09-08 15:59:00 INFO nxlog-ce-2.10.2150 started 2020-09-08 15:59:00 ERROR apr_sockaddr_info failed for :::515;Address family for hostname not supported 2020-09-08 16:00:49 ERROR invalid keyword: ListenAddr at /etc/nxlog.d/listener.conf:26 Can you confirm that IPv6 should theoretically be supported in 2.10.2150 ? If so, what needs to be enabled in the config if used with im_tcp ? If it's not supported (because currently only supported in the Enterprise Edition), are there any plans to include this also in the Community edition soon? thanks and best regards, micsnare

micsnare created
Replies: 2
View post »
last updated