Configuration
- 
Configuration Overview – The basics of the NXLog configuration system 
- 
NXLog Language – NXLog’s built-in interpreted language 
- 
Reading and Receiving Logs – Some of the ways in which NXLog can be configured to collect logs 
- 
Processing Logs – Many examples of the various ways NXLog may be configured to modify or act on an event 
- 
Forwarding and Storing Logs – Examples showing some common log outputs used with NXLog 
- 
Centralized Log Collection – About using a centralized log architecture with NXLog 
- 
Encrypted Transfer – Using encryption to protect log data from attackers 
- 
Reducing Bandwidth and Data Size – Reducing data requirements for transfer and storage 
- 
Reliable Message Delivery – Setting up guaranteed log data transport