Configuration
-
Configuration Overview – The basics of the NXLog configuration system
-
NXLog Language – NXLog’s built-in interpreted language
-
Reading and Receiving Logs – Some of the ways in which NXLog can be configured to collect logs
-
Processing Logs – Many examples of the various ways NXLog may be configured to modify or act on an event
-
Forwarding and Storing Logs – Examples showing some common log outputs used with NXLog
-
Centralized Log Collection – About using a centralized log architecture with NXLog
-
Encrypted Transfer – Using encryption to protect log data from attackers
-
Reducing Bandwidth and Data Size – Reducing data requirements for transfer and storage
-
Reliable Message Delivery – Setting up guaranteed log data transport