Receiving Data
LogZilla documentation for Receiving Data
Receiving Data in LogZilla
LogZilla accepts log data from diverse sources including network devices, servers, applications, and cloud services. Multiple ingestion methods support real-time log collection, processing, and analysis.
Supported Data Sources
Network Infrastructure
- Syslog Events: Standard syslog over UDP/TCP from network devices, servers, and applications
- Cisco IOS: Configuration for Cisco routers, switches, and security appliances
- Juniper SRX: Security platform logging with structured syslog
- SNMP Traps: Network monitoring and alerting via SNMP trap reception
Servers and Applications
- Windows Events: Forward Windows Event Log entries using the LogZilla Windows Agent
- Java Applications: Log4j and Log4j2 integration for enterprise applications
- NGINX: Web server access and error logs with key-value parsing
- BIND DNS: DNS server query and response logging
- Avaya Communication Manager: Unified communications platform logs
Cloud and HTTP Sources
- AWS CloudWatch: Forward CloudWatch logs via Kinesis Data Firehose
- HTTP Event Receiver: Direct HTTP/HTTPS ingestion with JSON payloads for custom integrations and modern applications
Getting Started
- Configure LogZilla listeners: Verify syslog ports and HTTP receiver settings in the LogZilla interface
- Choose ingestion method: Select syslog, HTTP, or cloud-specific integration based on the data source
- Configure the sender: Follow device or application-specific setup guides in this section
- Verify reception: Confirm log delivery and troubleshoot connectivity if needed
For network troubleshooting and packet-level verification, see Syslog Troubleshooting.