- Introduction
- Deployment
- Configuration
- 23. Configuration overview
- 24. NXLog Language
- 25. Reading and Receiving Logs
- 26. Processing Logs
- 27. Forwarding and Storing Logs
- 28. Centralized Log Collection
- 29. NXLog Failover Mode
- 30. High Availability
- 31. Encrypted Transfer
- 32. Reducing Bandwidth and Data Size
- 33. Reliable Message Delivery
- 34. Compression and Encryption
- OS Support
- Integration
- Troubleshooting
- Enterprise Edition Reference Manual
- NXLog Manager
- NXLog Add-Ons
Configuration
-
Configuration overview – The basics of the NXLog configuration system
-
NXLog Language – NXLog’s built-in interpreted language
-
Reading and Receiving Logs – Some of the ways in which NXLog can be configured to collect logs
-
Processing Logs – Many examples of the various ways NXLog may be configured to modify or act on an event
-
Forwarding and Storing Logs – Examples showing some common log outputs used with NXLog
-
Centralized Log Collection – About using a centralized log architecture with NXLog
-
NXLog Failover Mode – NXLog Failover Mode
-
High Availability – Deploying NXLog in high availability
-
Encrypted Transfer – Using encryption to protect log data from attackers
-
Reducing Bandwidth and Data Size – Reducing data requirements for transfer and storage
-
Reliable Message Delivery – Setting up guaranteed log data transport
-
Compression and Encryption – Compressing and encrypting logs