Configuration
-
Configuration overview — The basics of the NXLog configuration system
-
NXLog language — NXLog’s built-in interpreted language
-
Reading and receiving logs — Some of the ways in which NXLog can be configured to collect logs
-
Processing logs — Many examples of the various ways NXLog may be configured to modify or act on an event
-
Forwarding and Storing Logs — Examples showing some common log outputs used with NXLog
-
Centralized Log Collection — About using a centralized log architecture with NXLog
-
NXLog failover mode — The unique features of NXLog failover mode
-
High Availability (HA) — Deploying NXLog in high availability
-
Encrypted log transfer — Using encryption to protect log data from attackers
-
Reducing bandwidth and data size — Reducing data requirements for transfer and storage
-
Reliable message delivery — Setting up guaranteed log data transport
-
Compression and Encryption — Compressing and encrypting logs
-
Optimizing the configuration — Optimizing the NXLog configuration for higher throughput