• Products
    • View all products
    • Free trials
    • Log Management Appliance
    • Log Management Software
    • Open Source Log Management
  • Solutions
    • Optimizing SIEM
    • Universal log collection and routing
    • Big data ingestion
    • Rapid search and troubleshooting
    • Meeting compliance requirements
    • Secure data archive
  • Resources
    • Customer Stories
    • Documents
    • Events
    • Technical Documentation
      • syslog-ng Premium Edition
      • syslog-ng Store Box
      • syslog-ng Open Source
    • Videos
  • Trials
  • Support
    • Packages
    • By Product
      • syslog-ng Premium Edition
      • syslog-ng Store Box
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
  • Community
    • Home
    • Blog
    • Open Source Edition Mailing List
syslog-ng Community
syslog-ng Community
  • Site
  • User
  • Site
  • Search
  • User
syslog-ng Community
syslog-ng Community
Blog
    • New
    Blog
    Related Tags
    • Elasticsearch
    • Fedora
    • Insider
    • JSON
    • log management
    • macOS
    • python
    • RHEL
    • syslog-ng
    • tutorial
    Options
    • Subscribe by email
    • Posts RSS
    • More
    • Cancel
    Social Networks
    • Mailing List for OSE
    • Visit GitHub to download
    • Visit us on Twitter
    • Visit us on YouTube
    • Visit us on Facebook
    • Tags
    • Subscribe by email
    • More
    • Cancel
    • syslog-ng Premium Edition 7 released!

      syslog-ng Premium Edition 7 released!

      Hunor Voith
      Hunor Voith
      Today we’re announcing syslog-ng Premium Edition 7, our latest stable release for syslog-ng PE. This release is primarily for customers using syslog-ng PE as a log collection and log routing tool front-ending SIEM solutions and big data de...
      • 30 Nov 2016
    • syslog-ng Store Box goes to the cloud!

      syslog-ng Store Box goes to the cloud!

      Hunor Voith
      Hunor Voith
      With its latest 4 F6 feature release, you can deploy syslog-ng Store Box (SSB) on Amazon Web Services (AWS) using a bring-your-own license. Running SSB in AWS brings you the obvious benefits of running an application in the cloud, the most notab...
      • 28 Nov 2016
    • How to create heat maps to show who’s trying to connect your router

      How to create heat maps to show who’s trying to connect your router

      Peter Czanik
      Peter Czanik
      Last week after publishing my Elasticsearch 5 blog, I finally had a little time to take a look at the logs coming from my Turris Omnia router. It is running in a quiet neighborhood of Budapest, but looking at my logs it shows that I’m living in...
      • 24 Nov 2016
    • Fedora & openSUSE: what is common in the latest releases?

      Fedora & openSUSE: what is common in the latest releases?

      Peter Czanik
      Peter Czanik
      The second half of November brought us two exciting new Linux distribution releases: openSUSE Leap 42.2 and Fedora 25. While both of them are based on the RPM packaging format and cover everything from embedded through desktops to servers, there are …
      • 22 Nov 2016
    • Message parsing and community building: All Things Open 2016

      Message parsing and community building: All Things Open 2016

      Peter Czanik
      Peter Czanik
      Last week I visited All Things Open, one of the largest open source conferences of the US East Coast. The venue was the monumental building of the Raleigh Convention Center, just two blocks from Red Hat’s headquarters. I was presenting&nbs...
      • 9 Nov 2016
    • Test the latest FreeBSD with syslog-ng 3.8.1

      Test the latest FreeBSD with syslog-ng 3.8.1

      Peter Czanik
      Peter Czanik
      Even if I do not maintain a cluster of FreeBSD servers with thousands of jails anymore, my favorite server operating system is still FreeBSD. I started using it at version 2.X well over twenty years ago. Yesterday, FreeBSD 11.0 was released. For...
      • 11 Oct 2016
    • Enriching log messages with additional information

      Enriching log messages with additional information

      Peter Czanik
      Peter Czanik
      Log messages already contain a wealth of information about what is happening in your systems. Still, logs can be enriched with additional information – like the geo-location belonging to an IP address – which can improve the usability of ...
      • 7 Oct 2016
    • Linuxing in London

      Linuxing in London

      Peter Czanik
      Peter Czanik
      Last Tuesday, I was in London to present syslog-ng at the Linuxing in London meetup. It was my first trip to the UK, so I had some trouble with vehicles driving always on the unexpected side of the road.   As it was my first ...
      • 18 Sep 2016
    • syslog-ng Hits Major Milestone With Version 3.8.1 Release

      syslog-ng Hits Major Milestone With Version 3.8.1 Release

      Peter Czanik
      Peter Czanik
      I am happy to announce that after almost a year of development, syslog-ng 3.8.1 has been released. This is the first stable release from the syslog-ng 3.8 branch. Version 3.8.1 adds some long-awaited features to syslog-ng and improves ...
      • 5 Sep 2016
    • syslog-ng Premium Edition 6 LTS released!

      syslog-ng Premium Edition 6 LTS released!

      Hunor Voith
      Hunor Voith
      I am pleased to announce our latest long-term supported version of syslog-ng Premium Edition, 6 LTS. In addition to the long-awaited key-value parser, we updated the TLS cipher suite and introduced .NET Framework 4.0 support in the Windows agent...
      • 4 Aug 2016
    • syslog-ng 3.8 – what changed?

      syslog-ng 3.8 – what changed?

      Peter Czanik
      Peter Czanik
      Almost a year has passed since the last major syslog-ng release. The first beta of the upcoming 3.8 release was published last week. This brought many changes both in terms of new features and in packaging. To encourage testing I would like to highli…
      • 3 Aug 2016
    • Improve the Efficiency of Security Operations by Automatically Finding Critical Events

      Improve the Efficiency of Security Operations by Automatically Finding Critical Events

      Istvan Szabo
      Istvan Szabo
      An effective security operations center starts with a reliable tool for securely collecting all logs which are relevant from a security perspective. However, as the size and complexity of the enterprise IT infrastructure increases, the amount of logs…
      • 19 Jul 2016
    <>
    • Company
      • About Us
      • Careers
      • Contact Us
      • News
    • Resources
      • Blogs
      • Customer Stories
      • Documents
      • Events
      • Videos
    • Support
      • Overview
      • Open Source Edition Mailing List
      • Technical Documentation
    • Social Networks
      • Facebook
      • Github
      • Twitter
      • Youtube
    • Partners
      • Become a Partner
      • Partner Finder
      • Partner Login
    • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
    • Legal
    • Terms of Use
    • Privacy