• Products
    • View all products
    • Free trials
    • Log Management Appliance
    • Log Management Software
    • Open Source Log Management
  • Solutions
    • Optimizing SIEM
    • Universal log collection and routing
    • Big data ingestion
    • Rapid search and troubleshooting
    • Meeting compliance requirements
    • Secure data archive
  • Resources
    • Customer Stories
    • Documents
    • Events
    • Technical Documentation
      • syslog-ng Premium Edition
      • syslog-ng Store Box
      • syslog-ng Open Source
    • Videos
  • Trials
  • Support
    • Packages
    • By Product
      • syslog-ng Premium Edition
      • syslog-ng Store Box
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
  • Community
    • Home
    • Blog
    • Open Source Edition Mailing List
syslog-ng Community
syslog-ng Community
  • Site
  • User
  • Site
  • Search
  • User
syslog-ng Community
syslog-ng Community
Blog
    • New
    Blog
    Related Tags
    • Elasticsearch
    • Fedora
    • Insider
    • JSON
    • log management
    • macOS
    • python
    • RHEL
    • syslog-ng
    • tutorial
    Options
    • Subscribe by email
    • Posts RSS
    • More
    • Cancel
    Social Networks
    • Mailing List for OSE
    • Visit GitHub to download
    • Visit us on Twitter
    • Visit us on YouTube
    • Visit us on Facebook
    • Tags
    • Subscribe by email
    • More
    • Cancel
    • Those who helped turning the Higgs boson from theory to reality

      Those who helped turning the Higgs boson from theory to reality

      Peter Czanik
      Peter Czanik
      One of the most important discoveries of this decade was the Higgs boson. But researchers at High Energy Physics and Nuclear Physics laboratories and institutes would have been unable to find the Higgs boson without the IT staff maintaining the compu…
      • 24 May 2017
    • Using syslog-ng with SELinux in enforcing mode

      Using syslog-ng with SELinux in enforcing mode

      Peter Czanik
      Peter Czanik
      Security-Enhanced Linux (SELinux) is a set of kernel and user-space tools enforcing strict access control policies. It is also the tool behind at least half of the syslog-ng problem reports. SELinux rules in Linux distributions cover all aspects of t…
      • 18 May 2017
    • Endpoint visibility and monitoring using osquery and syslog-ng

      Endpoint visibility and monitoring using osquery and syslog-ng

      Peter Czanik
      Peter Czanik
      Using osquery you can ask questions about your machine using an SQL-like language. For example, you can query running processes, logged in users, installed packages and syslog messages as well. You can make queries on demand, and also schedule them t…
      • 27 Apr 2017
    • Monitor your syslog-ng architecture easier

      Monitor your syslog-ng architecture easier

      Hunor Voith
      Hunor Voith
      Today we’re announcing syslog-ng Premium Edition 7.0.2, our latest stable release for syslog-ng PE. We crammed a couple great new features in this release: a streamlined and easy-to-integrate self-monitoring tool, and Python support for message…
      • 12 Apr 2017
    • Collecting and parsing Suricata logs using syslog-ng

      Collecting and parsing Suricata logs using syslog-ng

      Peter Czanik
      Peter Czanik
      From this blog you will learn how to compile a simple configuration for Suricata on the Turris Omnia router and how to configure syslog-ng to forward its log messages to a central log collector. In the second part of this blog, you will learn why and…
      • 5 Apr 2017
    • Your central log server in Docker

      Your central log server in Docker

      Peter Czanik
      Peter Czanik
      Containerization, and Docker in particular, changed the way we distribute and run applications. I used containers – FreeBSD jails – for nearly twenty years, but Docker brought us the ease of use necessary for wide adoption. Containers pro...
      • 30 Mar 2017
    • Better Understanding Privileged User Risk by Inspecting Sudo Logs

      Better Understanding Privileged User Risk by Inspecting Sudo Logs

      Istvan Szabo
      Istvan Szabo
      In our previous blogs on central log management, we touched on the topic of effective search in a centralized log repository. In this post, we take a look at the risk of ‘sudoing’, and how you can quickly and easily surface sudo related i...
      • 23 Mar 2017
    • syslog-ng at SCALE 2017

      syslog-ng at SCALE 2017

      Peter Czanik
      Peter Czanik
      It is the third year that syslog-ng has participated at Southern California Linux Expo or, as better known to many, SCALE ‒ the largest Linux event in the USA. In many ways it is similar to FOSDEM in Europe, however, SCALE also focuses on users and a…
      • 9 Mar 2017
    • On Search Optimization for Log Management

      On Search Optimization for Log Management

      Hunor Voith
      Hunor Voith
      Centralized log management certainly is a great solution when you are trying to tackle issues related to handling huge amounts of logs. With the right tool, it can be also beneficial on collection and search performance – areas that syslog-ng S...
      • 8 Mar 2017
    • Testing the performance of log streaming to Kafka with syslog-ng

      Testing the performance of log streaming to Kafka with syslog-ng

      Zoltan.Pallagi
      Zoltan.Pallagi
      In our previous post, we discussed the performance of syslog-ng, streaming logs to HDFS destinations. Now we’ll pick up where we left off, and continue our performance evaluation with the Kafka. In our Kafka tests, we used syslog-ng Premiu...
      • 1 Mar 2017
    • Key takeaway about Central Log Management from RSA

      Key takeaway about Central Log Management from RSA

      Hunor Voith
      Hunor Voith
      A couple weeks ago our CTO, Balázs Scheidler reflected on the importance of central log management, an approach that we have been advocating for a long time and was also underpinned by a recent report by Gartner. Having spent the past week at …
      • 23 Feb 2017
    • Parsing web server access logs

      Parsing web server access logs

      Peter Czanik
      Peter Czanik
      If you operate web servers, you want to have insight about your traffic. Traditional solutions to process access logs include: scripts to create nightly reports with tools like AWStats run a JavaScript snippet on each page load, like Google Analytic…
      • 16 Feb 2017
    <>
    • Company
      • About Us
      • Careers
      • Contact Us
      • News
    • Resources
      • Blogs
      • Customer Stories
      • Documents
      • Events
      • Videos
    • Support
      • Overview
      • Open Source Edition Mailing List
      • Technical Documentation
    • Social Networks
      • Facebook
      • Github
      • Twitter
      • Youtube
    • Partners
      • Become a Partner
      • Partner Finder
      • Partner Login
    • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
    • Legal
    • Terms of Use
    • Privacy