NXLog Integration Guides
-
ABB MicroSCADA Pro SYS600 — Collecting Logs from ABB MicroSCADA Pro SYS600 using NXLog
-
Amazon Web Services (AWS) — Setting up integration with various services offered by AWS
-
Apache HTTP Server — Collecting and parsing messages from Apache’s error log and access log
-
Apache NiFi — Receiving and sending data to NXLog
-
Apache Tomcat — Collecting and parsing messages from Apache Tomcat container log files
-
APC Automatic Transfer Switch — Configuring ATS logging and collecting the logs with NXLog
-
ArcSight Common Event Format (CEF) — Collecting and forwarding logs in the Common Event Format (CEF)
-
AVEVA System Platform — Collecting Logs from AVEVA System Platform with NXLog
-
Box — Pull events from Box
-
Brocade switches — Configuring a Brocade switch to send logs and collecting the logs with NXLog
-
Browser history logs — Collecting logs from a browser history database
-
Check Point — Collecting logs from Check Point devices using the LEA protocol
-
Cisco ACS — Collecting and parsing logs from ACS devices
-
Cisco ASA — Configuring ASA logging and parsing the logs with NXLog
-
Cisco FireSIGHT — Collect events from FireSIGHT systems
-
Cisco IPS — Collect alerts from a Cisco Intrusion Prevention System
-
Cloud Instance Metadata — Adding instance metadata to events
-
Common Event Expression (CEE) — Sending and receiving CEE-formatted logs with NXLog
-
Content Management Systems — Collecting logs from Content Management Systems
-
Dell EqualLogic — Configuring EqualLogic logging and extracting fields from the log data
-
Dell iDRAC — Configuring iDRAC logging and parsing the logs with NXLog
-
Dell PowerVault MD series — Configuring PowerVault logging and collecting the logs with NXLog
-
Devo — Collecting, parsing and sending logs to devo
-
DHCP logs — Collecting logs from DHCP servers and clients
-
DNS Monitoring — Configuring DNS Server logging and parsing the logs with NXLog
-
Docker — Collecting logs from a Docker daemon or container
-
Elastic Common Schema (ECS) — Sending ECS-compliant logs
-
Elastic Cloud — Sending logs to Elastic Cloud via HTTPS
-
Elasticsearch and Kibana — Sending logs directly to Elasticsearch or to Logstash
-
F5 BIG-IP — Configuring BIG-IP logging and collecting the logs with NXLog
-
File Integrity Monitoring — Using NXLog to detect and log changes to files and directories
-
FreeRADIUS — Processing FreeRadius authentication and accounting logs with NXLog
-
General Electric CIMPLICITY — Collecting Logs from General Electric CIMPLICITY using NXLog
-
Google Chronicle — Configure NXLog to send logs to Google Chronicle
-
Graylog — Using NXLog as a collector for Graylog
-
HP ProCurve — Configuring logging on ProCurve devices and collecting the logs with NXLog
-
IBM QRadar SIEM — Integrating NXLog with IBM QRadar SIEM
-
Industrial Control System protocols — Capturing network packets for ICS protocols
-
Kubernetes — Collecting application, system, and audit logs from Kubernetes
-
Linux Audit system — Collecting Audit logs with NXLog
-
Linux system logs — Using NXLog to collect system logs on Linux
-
Log Event Extended Format (LEEF) — Sending and receiving LEEF-formatted logs
-
LogPoint — Sending and receiving logs to and from LogPoint
-
Logstash — Sending and receiving logs to and from Logstash
-
McAfee Enterprise Security Manager (ESM) — Sending different log types to McAfee ESM
-
Micro Focus ArcSight Logger — Sending and receiving logs to and from ArcSight Logger
-
Microsoft Active Directory Domain Controller — Collecting domain controller debug logs with NXLog
-
Microsoft Azure Event Hubs — Forwarding log data to Microsoft Azure Event Hubs
-
Microsoft Defender for Identity — Collecting and forwarding logs from Microsoft Defender for Identity
-
Microsoft Exchange — Configuring and collecting several different types of Exchange logs
-
Microsoft IIS — Configuring and collecting various logs written by IIS
-
Microsoft Routing and Remote Access Service (RRAS) — Collecting Routing and Remote Access activity and debug logs
-
Microsoft Sentinel — Configure NXLog to send logs to Microsoft Sentinel
-
Microsoft SharePoint — Collecting several types of SharePoint logs with NXLog
-
Microsoft SQL Server — Collecting Microsoft SQL Server logs, and reading from or writing to a database
-
Microsoft System Center Configuration Manager — Setting up SCCM log collection
-
Microsoft System Center Endpoint Protection — Collect and parse events from the SCEP client
-
Microsoft System Center Operations Manager — Setting up SCOM log collection
-
MongoDB — Collecting log data from a MongoDB database
-
Nagios Log Server — Uses NXLog to send logs to Nagios Log Server
-
Nessus Vulnerability Scanner — Parsing Nessus scan results with NXLog Enterprise Edition
-
NetApp — Configuring NetApp logging and collecting the logs with NXLog
-
.NET application logs — Adding logging functionality to a .NET application
-
Nginx — Collecting and parsing Nginx error and access logs
-
Okta — Pull events from Okta
-
Oracle Database — Collecting Oracle Database logs and reading from and writing to an Oracle database
-
Postfix — Configuring Postfix logging and collecting the logs with NXLog
-
Promise — Collecting Promise SAN logs with NXLog
-
Raijin Database Engine — Forwarding log data to Raijin Server
-
Rapid7 InsightIDR SIEM — Collecting, parsing and sending logs to Rapid7 InsightIDR SIEM
-
RSA NetWitness — Sending logs to NetWitness with NXLog
-
SafeNet KeySecure — Collecting and parsing logs from KeySecure devices
-
Salesforce — Fetch events from Salesforce
-
SAP — Collect and parse logs from an SAP system
-
Schneider Electric Citect SCADA — Collecting logs from Schneider Electric Citect SCADA with NXLog
-
Schneider Electric EcoStruxure Process Expert — Collecting logs from Schneider Electric EcoStruxure Process Expert with NXLog
-
Siemens SICAM SCC — Configure NXLog to collect logs from Siemens SICAM SCC
-
Siemens SICAM PAS/PQS — Configure NXLog to collect logs from Siemens Sicam PAS/PQS
-
Siemens SIMATIC PCS 7 — Configure NXLog to collect logs from Siemens SIMATIC PCS 7
-
Snare — Sending and receiving Snare-formatted logs with NXLog
-
Snort — Collecting and parsing Snort alert logs
-
Solarwinds Loggly — Collecting, parsing, and sending logs to Loggly
-
Splunk — Forwarding logs to Splunk in different formats
-
Sumo Logic — Collecting, parsing, and sending logs to the Sumo Logic platform
-
Symantec Endpoint Protection — Collect virus alerts and audit events from an SEPM server
-
Synology DiskStation — Collecting logs from a DiskStation appliance
-
Syslog — Using the various syslog formats with NXLog
-
Sysmon — Collecting, parsing, and filtering Sysmon events
-
Trellix ePolicy Orchestrator — Collect logs from Trellix ePolicy Orchestrator
-
Ubiquiti UniFi — Configuring UniFi logging; collecting and parsing the logs with NXLog
-
VMware vCenter — Collecting vCenter logs locally or remotely
-
Windows AppLocker — Collecting events generated by the AppLocker system
-
Windows Command Line Auditing — Auditing Windows command line
-
Windows Event Forwarding — Collecting events from WEF clients
-
Windows Event Log — Collecting Windows Event Log data
-
Windows Firewall — Configuring and collecting various types of Windows Firewall logs
-
Windows Group Policy — Collect and parse events from Windows Group Policy
-
Windows Management Instrumentation (WMI) — Collecting events from WMI log files
-
Windows PowerShell — Using PowerShell scripts and logging PowerShell activity
-
Windows Resource Checker — Collecting Windows Resource Checker logs
-
Windows Security audit — Collecting Windows audit events
-
Windows Server Failover Clustering — Collecting Windows Sever Failover Clustering logs
-
Windows Task Scheduler — Collecting Windows Task Scheduler logs
-
Windows Time service — Collecting Windows Time service logs
-
Microsoft Windows Update — Collecting Windows Update Logs
-
Windows USB auditing — Windows USB Auditing
-
Yokogawa FAST/TOOLS — Configure NXLog to collect logs from Yokogawa FAST/TOOLS
-
Zeek (formerly Bro) Network Security Monitor — Using NXLog to collect logs from Zeek