News and blog
NXLog main page
  • Products
    NXLog Platform
    Log collection
    Log management and analytics
    Log storage
    NXLog Community Edition
    Integrations
    Professional Services
  • Solutions
    Use cases
    Specific OS support
    SCADA/ICS
    Windows event log
    DNS logging
    MacOS logging
    Solutions by industry
    Financial Services
    Government & Education
    Entertainment & Gambling
    Telecommunications
    Medical & Healthcare
    Military & Defense
    Law Firms & Legal Counsel
    Industrial & Manufacturing
  • Pricing
    Licensing
    Plans
  • Partners
    Find a Reseller
    Partner Program
    Partner Portal
  • Resources
    Documentation
    Blog
    White papers
    Videos
    Webinars
    Case Studies
    Community Program
    Community Forum
  • About
    Company
    Careers
  • Support
    Support portals
    Contact us

NXLog Platform
Log collection
Log management and analytics
Log storage
NXLog Community Edition
Integrations
Professional Services

Use Cases
Specific OS support
SCADA/ICS
Windows event log
DNS logging
MacOS logging
Solutions by industry
Financial Services
Government & Education
Entertainment & Gambling
Telecommunications
Medical & Healthcare
Military & Defense
Law Firms & Legal Counsel
Industrial & Manufacturing

Licensing
Plans

Find a Reseller
Partner Program
Partner Portal

Documentation
Blog
White papers
Videos
Webinars
Case Studies
Community Program
Community Forum

Company
Careers

Support portals
Contact us
Let's Talk
  • Start free
  • Interactive demo
Let's Talk
  • Start free
  • Interactive demo
NXLog search
  • Loading...
Let's Talk
  • Start free
  • Interactive demo
December 12, 2025 comparison

rsyslog vs syslog-ng: Which is the right log shipper?

By Roman Krasnov

Share
ALL ANNOUNCEMENT COMPARISON COMPLIANCE DEPLOYMENT SECURITY SIEM STRATEGY RSS

Well, no doubt logging is the nervous system of any IT infrastructure. From troubleshooting outages to satisfying compliance audits and threat management, having the right log management pipeline can make the difference between smooth operations and chaotic firefighting. For decades, syslog-ng and rsyslog have been two of the most widely used log management tools for Unix and Linux environments. Both provide implementations of the original 1980s syslog protocol and are designed to collect, process, and forward log messages across networks.

At first glance, these two tools look similar: they share the same goal and offer comparable capabilities, such as support for structured data formats, flexible filtering, transformations, and multiple transport protocols. However, the differences between them become evident when you dive into their configuration models, performance characteristics, scalability, and ecosystem support.

In this article we will walk through the strengths and weaknesses of syslog-ng and rsyslog, highlight their differences, so finally you can decide which to go with, building your log shipping and telemetry management over in heterogeneous, cloud-native and hybrid environments.

The origins of syslog, rsyslog and syslog-ng

Before diving into the details, it’s worth revisiting where these tools came from.

The syslog protocol originated in the 1980s as part of the Unix operating system. Initially, syslog was a very simple way for daemons and applications to write log messages into a centralized logging service. Messages were tagged with a priority and facility and then written to a flat text file, typically /var/log/syslog.

Over time, as networks grew and distributed systems became the norm, syslog evolved into a network log forwarding protocol. It was standardized under RFC 3164 (informal) and later RFC 5424 (formal, supporting structured data and UTF-8).

  • syslog-ng (developed in 1998 by Balabit, now One Identity) was one of the first major enhancements to the original syslogd daemon. Its goal was to modernize syslog by adding stronger filtering, modular configuration, and support for secure transports like TLS.

  • rsyslog (created in 2004 by Rainer Gerhards) started as a drop-in replacement for syslogd, but quickly grew into a high-performance log processing engine with advanced features such as database logging, encryption, and support for massive message throughput.

Today, both remain popular — often bundled by default in Linux distributions — but they tend to appeal to slightly different user bases.

syslog-ng: A flexible and modular log daemon

syslog-ng is often described as the "Swiss army knife" of log management. It takes the simplicity of syslogd and extends it with modular configuration blocks that allow precise control over how logs are collected, parsed, filtered, and routed.

Key features of syslog-ng:

  • Modular and highly configurable: Its configuration language is expressive, enabling fine-grained control over log flows.

  • Structured logging: Natively supports JSON and other structured formats, making it easier to forward logs into SIEMs and analytics platforms.

  • Advanced filtering and parsing: Complex conditions can be applied to determine where and how messages are routed.

  • High reliability under load: syslog-ng has been tested extensively in large-scale enterprise environments.

  • Security features: Native support for TLS encryption, mutual authentication, and digital signatures.

To better understand its role, let’s look at the strengths that make syslog-ng a good fit for enterprises, as well as some drawbacks you may encounter.

Table 1. Pros and cons of syslog-ng
Pros of syslog-ng Cons of syslog-ng
  • Fine-grained filtering. Ideal for enterprises needing strict control over message routing.

  • Extensive protocol support. Works with legacy syslog, RFC 5424, JSON, and custom log structures.

  • Mature ecosystem. Widely used in enterprise-grade solutions.

  • Battle-tested stability. Deployed in financial institutions, government networks, and ISPs.

  • Steep learning curve. Its configuration DSL is powerful but not beginner friendly.

  • Configuration management. Still relies on manual text-based config files, which can get unwieldy.

  • Resource overhead. Complex setups may demand more CPU and memory.

  • Limited OS coverage. Primarily Linux/Unix; Windows support is minimal.

You may find syslog-ng applicable in typical use cases such as:

  • Enterprises needing custom log routing and filtering.

  • Environments with mixed log formats that need normalization.

  • Security-conscious organizations requiring TLS and message integrity validation.

rsyslog: A high-performance logging powerhouse

rsyslog has become the default logging daemon in many Linux distributions, including Red Hat Enterprise Linux, Ubuntu, and Debian. While it started as a syslogd replacement, its scope grew into a high-performance event processor capable of handling millions of log messages per second.

Key features of rsyslog:

  • Multi-protocol support — Handles UDP, TCP, and RELP (Reliable Event Logging Protocol) for guaranteed delivery.

  • High throughput — Optimized for speed, often outperforming syslog-ng in benchmarks.

  • Extensibility — Rich ecosystem of plugins for inputs, outputs, and processing.

  • Structured data handling — Supports JSON, CEE, and other formats.

  • Database integration — Can log directly into MySQL, PostgreSQL, or MongoDB.

Now, let’s explore where rsyslog really shines and where it may present challenges.

Table 2. Pros and cons of rsyslog
Pros of rsyslog Cons of rsyslog
  • Performance at scale. Proven to handle hundreds of thousands of messages per second.

  • Reliable delivery. With RELP, logs are guaranteed not to be lost in transit.

  • Plugin ecosystem. Easy to extend functionality.

  • Default daemon. Familiar to most Linux admins since it ships with major distros.

  • Complex configuration. Syntax can feel cryptic, especially with advanced setups.

  • Resource consumption. High-performance configurations may require tuning.

  • Limited cross-platform support. Like syslog-ng, mainly Linux/Unix.

  • Steeper troubleshooting curve. Debugging complex rsyslog pipelines can be challenging.

Typical use cases for rsyslog may be summarized as follows:

  • High-throughput environments (telecoms, ISPs, cloud-scale systems).

  • Database logging when applications require direct persistence.

  • Linux admins who want a default, well-supported logging stack without external dependencies.

syslog-ng vs rsyslog: A side-by-side comparison

Table 3. Side-by-side comparison of syslog-ng and rsyslog
Feature or aspect syslog-ng rsyslog

First Release

1998

2004

Design Focus

Flexibility & filtering

Performance & reliability

Config Language

Domain-specific (DSL)

Traditional, rule-based syntax

Protocol Support

UDP, TCP, TLS, RFC5424

UDP, TCP, RELP, TLS, RFC5424

Structured Data

JSON, XML, custom formats

JSON, CEE, custom formats

Database Logging

Limited support

Strong (MySQL, PostgreSQL, MongoDB)

Cross-Platform

Linux/Unix, minimal Windows

Linux/Unix, minimal Windows

Performance

Good, scalable

Very high (millions of EPS)

Ease of Use

Moderate to difficult

Moderate to difficult

Best Fit

Enterprises with custom routing

High-performance, large volumes

Another option to consider: NXLog Platform

While syslog-ng and rsyslog remain excellent choices for traditional Unix/Linux systems, modern IT environments often span Windows, Linux, macOS, cloud VMs, and containers. This is where NXLog Platform and NXLog Agent stand out. Unlike the Unix-centric daemons, NXLog Agent is a true cross-platform log and telemetry shipper, supporting:

  • Operating systems: Windows, Linux, macOS, Solaris, AIX, FreeBSD (x32/x64, ARM).

  • Log sources and formats: Windows Event Logs, syslog, JSON, XML, CEF, and more.

  • Destinations: SIEMs, APM tools, observability platforms (Splunk, Elasticsearch, Datadog, etc.)

You may consider NXLog Platform and the bundled NXLog Agent for a set of reasons:

  • Cross-platform by design: No need to run different tools for different OSes.

  • Performance: Efficient parsing and routing with minimal CPU/memory overhead.

  • Security-first: Built-in TLS/SSL encryption and authentication.

  • Extended functionality: File integrity monitoring (FIM), trace/metric collection, and compliance support (PCI DSS, HIPAA, SOX).

Conclusion

Both syslog-ng and rsyslog have proven their worth as battle-tested, reliable log shippers in Unix/Linux infrastructures of any scale and grade. Choose syslog-ng if you need complex filtering, structured data handling, and enterprise-grade security features. If raw performance, scalability, and reliable delivery are your top priorities - you could opt to rsyslog.

However, for organizations running hybrid, multi-OS, or cloud-native environments, neither tool fully addresses the challenges of cross-platform telemetry. In these cases, a more modern telemetry pipeline solution like NXLog Platform offers the flexibility, performance, and coverage required to unify logging across diverse systems, formats, protocols or integrations.

Frequently asked questions (FAQ)

Q: Which is easier to configure: rsyslog or syslog-ng?

A: Both have a learning curve. syslog-ng uses a domain-specific configuration language that can feel intuitive once learned, but it is verbose. rsyslog relies on a rule-based syntax that can be cryptic at first but is widely documented. For simple setups, rsyslog might feel quicker, but for complex pipelines, syslog-ng often offers clearer logic.

Q: Can I use rsyslog or syslog-ng on Windows?

A: Both tools are primarily designed for Unix/Linux environments. While there are limited ports for Windows, they are not widely supported. For production-grade Windows logging, a cross-platform agent like NXLog Agent is usually a better choice.

Q: Which tool performs better under heavy load?

A: rsyslog generally outperforms syslog-ng in benchmarks, especially when handling millions of events per second. This is due to its RELP protocol support and optimized buffering. However, syslog-ng is still highly reliable and more than capable of handling large-scale enterprise workloads.

Q: Do syslog-ng and rsyslog support modern log formats like JSON?

A: Yes, both support structured log formats such as JSON, CEE, and XML. This makes them compatible with modern observability and SIEM platforms, which expect structured data instead of plain text logs.

Q: Should I replace syslog-ng or rsyslog with NXLog Platform?

A: Not necessarily. If your infrastructure is Unix/Linux-only and your current setup works, sticking with rsyslog or syslog-ng may be fine. However, if you run a hybrid environment (Windows, Linux, cloud, containers) and need advanced features like file integrity monitoring, metrics, or compliance support, NXLog Platform provides a unified and more scalable solution. Also, migrating to NXLog Platform is seamless whatever endpoints (like SIEM) your existing pipeline has.

NXLog Platform is an on-premises solution for centralized log management with
versatile processing forming the backbone of security monitoring.

With our industry-leading expertise in log collection and agent management, we comprehensively
address your security log-related tasks, including collection, parsing, processing, enrichment, storage, management, and analytics.

Start free Contact us
  • linux-logs
  • syslog-ng
  • rsyslog
  • comparison
Share

Facebook Twitter LinkedIn Reddit Mail
Related Posts

Making the most of Windows Event Forwarding for centralized log collection
6 minutes | December 17, 2018
DNS Log Collection on Windows
8 minutes | May 28, 2020
How to choose a log management solution
14 minutes | January 6, 2025

Stay connected:

Sign up

Keep up to date with our monthly digest of articles.

By clicking singing up, I agree to the use of my personal data in accordance with NXLog Privacy Policy.

Featured posts

Announcing NXLog Platform 1.10
December 11, 2025
Announcing NXLog Platform 1.9
October 22, 2025
Gaining valuable host performance metrics with NXLog Platform
September 30, 2025
Announcing NXLog Platform 1.8
September 12, 2025
Security Event Logs: Importance, best practices, and management
July 22, 2025
Announcing NXLog Platform 1.7
June 25, 2025
Enhancing security with Microsoft's Expanded Cloud Logs
June 10, 2025
Announcing NXLog Platform 1.6
April 22, 2025
Announcing NXLog Platform 1.5
February 27, 2025
Announcing NXLog Platform 1.4
December 20, 2024
NXLog redefines log management for the digital age
December 19, 2024
2024 and NXLog - a review
December 19, 2024
Announcing NXLog Platform 1.3
October 25, 2024
NXLog redefines the market with the launch of NXLog Platform: a new centralized log management solution
September 24, 2024
Welcome to the future of log management with NXLog Platform
August 28, 2024
Announcing NXLog Enterprise Edition 5.11
June 20, 2024
Raijin announces release of version 2.1
May 31, 2024
Ingesting log data from Debian UFW to Loki and Grafana
May 21, 2024
Announcing NXLog Enterprise Edition 6.3
May 13, 2024
Raijin announces release of version 2.0
March 14, 2024
NXLog Enterprise Edition on Submarines
March 11, 2024
The evolution of event logging: from clay tablets to Taylor Swift
February 6, 2024
Migrate to NXLog Enterprise Edition 6 for our best ever log collection experience
February 2, 2024
Raijin announces release of version 1.5
January 26, 2024
2023 and NXLog - a review
December 22, 2023
Announcing NXLog Enterprise Edition 5.10
December 21, 2023
Raijin announces release of version 1.4
December 12, 2023
Announcing NXLog Enterprise Edition 6.2
December 4, 2023
Announcing NXLog Manager 5.7
November 3, 2023
Announcing NXLog Enterprise Edition 6.1
October 20, 2023
Raijin announces release of version 1.3
October 6, 2023
Upgrading from NXLog Enterprise Edition 5 to NXLog Enterprise Edition 6
September 11, 2023
Announcing NXLog Enterprise Edition 6.0
September 11, 2023
The cybersecurity challenges of modern aviation systems
September 8, 2023
Raijin announces release of version 1.2
August 11, 2023
The Sarbanes-Oxley (SOX) Act and security observability
August 9, 2023
PCI DSS 4.0 compliance: Logging requirements and best practices
August 2, 2023
Detect threats using NXLog and Sigma
July 27, 2023
HIPAA logging requirements and how to ensure compliance
July 19, 2023
Announcing NXLog Enterprise Edition 5.9
June 20, 2023
Industrial cybersecurity - The facts
June 8, 2023
Raijin announces release of version 1.1
May 30, 2023
CISO starter pack - Security Policy
May 2, 2023
Announcing NXLog Enterprise Edition 5.8
April 24, 2023
CISO starter pack - Log collection fundamentals
April 3, 2023
Raijin announces release of version 1.0
March 9, 2023
Avoid vendor lock-in and declare SIEM independence
February 13, 2023
Announcing NXLog Enterprise Edition 5.7
January 20, 2023
NXLog - 2022 in review
December 22, 2022
Need to replace syslog-ng? Changing to NXLog is easier than you think
November 23, 2022
The EU's response to cyberwarfare
November 22, 2022
Looking beyond Cybersecurity Awareness Month
November 8, 2022
GDPR compliance and log management best practices
September 23, 2022
NXLog in an industrial control security context
August 10, 2022
Raijin vs Elasticsearch
August 9, 2022
NXLog provides native support for Google Chronicle
May 11, 2022
Aggregating macOS logs for SIEM systems
February 17, 2022
How a centralized log collection tool can help your SIEM solutions
April 1, 2020

Categories

  • ANNOUNCEMENT
  • COMPARISON
  • COMPLIANCE
  • DEPLOYMENT
  • SECURITY
  • SIEM
  • STRATEGY
logo

Subscribe to our newsletter to get the latest updates, news, and products releases. 

© Copyright NXLog FZE.

Privacy Policy. General Terms of Use

Follow us

  • Product
  • NXLog Platform 
  • Log collection
  • Log management and analysis
  • Log storage
  • Integration
  • Professional Services
  • Plans
  • Resources
  • Documentation
  • Blog
  • White papers
  • Videos
  • Webinars
  • Case studies
  • Community Program
  • Community forum
  • Support
  • Getting started guide
  • Support portals
  • About NXLog
  • About us
  • Careers
  • Find a reseller
  • Partner program
  • Contact us