Deploying on AWS

NXLog Manager can be deployed in a cloud environment such as Amazon Web Services. Cloud services can be easily leveraged in order to provide high availability and disaster recovery capabilities. In such a scenario, NXLog Manager will be deployed in a distributed setup across multiple availability zones.

NXLog Manager AWS deployment

Setting up NXLog Manager on AWS

  1. To start with, the database needs to be prepared. The Amazon Relational Database Service (RDS) works well with NXLog Manager. For data redundancy, create a database (MySQL or MariaDB) in Multi-AZ deployment mode. This option will create a read replica.

    Creating a database in Multi-AZ mode
  2. Install NXLog Manager from the DEB or RPM package, depending on the operating system. At least the EC2 "t2.small" instance type is recommended.

  3. Edit /opt/nxlog-manager/db_init/db.conf. Add the RDS hostname and the database master username/password to the MYSQLOPTS variable.

  4. Execute the database initialization script. This should only be done once for the cluster!

    # cd /opt/nxlog-manager/db_init
    # ./
  5. Configure NXLog Manager to run in a distributed manner by editing the INSTANCE_MODE in /opt/nxlog-manager/conf/nxlog-manager.conf.

  6. In /opt/nxlog-manager/conf/jetty-env.xml, provide details for Java Message Service (JMS) communication.

    1. Set JMSBrokerAddress to the instance private IP, used for communications inside the VPC.

      <Set name="jmsBrokerAddress"></Set>
    2. Set database details in jdbcUrl by providing the RDS endpoint.

      <Set name="jdbcUrl">jdbc:mysql://;characterEncoding=UTF-8&amp;characterSetResults=UTF-8&amp;autoReconnect=true</Set>
    3. Update Log4ensicsDatabaseAccess.

      <New class="">
           <Set name="databaseName">nxlog-manager5</Set>
           <Set name="username">nxlog-manager5</Set>
           <Set name="password">nxlog-manager5</Set>
           <Set name="location"></Set>
  7. From the EC2 service dashboard, go to Security Groups. Allow TCP traffic on ports 20000 and 34200-34300 to allow JMS communications inside the security group created for NXLog Manager EC2 instances. Please note that the security group ID should be used in the Source field.

    Configuring security group
  8. The nxlog-manager service can now be started.

    # service nxlog-manager start

Configuring Load Balancing

In order to access NXLog Manager from a single URL, as well as benefit from application redundancy, a Load Balancer is needed.

  1. From the EC2 service dashboard, go to Load Balancing. Click Create Load Balancer. Select Application Load Balancer and click Create.

  2. Configure the load balancer. Set the listener to use port 9090 (the same as the backend application).

    Configuring Load Balancer, 1
  3. Choose availability zones and configure a security group in order to limit access to the load balancer. Configure routing to forward requests to port 9090.

    Configuring Load Balancer, 2
  4. Configure the health check path to /nxlog-manager. In Advanced health check settings, set the Success codes to 302, as it is the default reply from the nxlog-manager service.

    Configuring Load Balancer, 3
  5. Select instances for the target group and finish creation of the load balancer. From the EC2 dashboard, go to Target Groups (in the LOAD BALANCING section). Select the target group and click Edit attributes. Enable Stickiness to prevent breaking user sessions. This will create a cookie named AWSALB with encrypted contents.

    Configuring Load Balancer, 4
  6. Edit security groups to allow traffic between the load balancer and its target group. After this step, the solution is ready.

    Configuring Load Balancer, 5