Configuration
- 
Configuration overview — The basics of the NXLog configuration system 
- 
NXLog language — NXLog’s built-in interpreted language 
- 
Reading and receiving logs — Some of the ways in which NXLog can be configured to collect logs 
- 
Processing logs — Many examples of the various ways NXLog may be configured to modify or act on an event 
- 
Forwarding and Storing Logs — Examples showing some common log outputs used with NXLog 
- 
Centralized Log Collection — About using a centralized log architecture with NXLog 
- 
NXLog failover mode — The unique features of NXLog failover mode 
- 
High Availability (HA) — Deploying NXLog in high availability 
- 
Encrypted log transfer — Using encryption to protect log data from attackers 
- 
Reducing bandwidth and data size — Reducing data requirements for transfer and storage 
- 
Reliable message delivery — Setting up guaranteed log data transport 
- 
Compression and Encryption — Compressing and encrypting logs 
- 
Optimizing the configuration — Optimizing the NXLog configuration for higher throughput 
