Receiving Data

LogZilla documentation for Receiving Data

Receiving Data in LogZilla

LogZilla accepts log data from diverse sources including network devices, servers, applications, and cloud services. Multiple ingestion methods support real-time log collection, processing, and analysis.

Supported Data Sources

Network Infrastructure

  • Syslog Events: Standard syslog over UDP/TCP from network devices, servers, and applications
  • Cisco IOS: Configuration for Cisco routers, switches, and security appliances
  • Juniper SRX: Security platform logging with structured syslog
  • SNMP Traps: Network monitoring and alerting via SNMP trap reception

Servers and Applications

  • Windows Events: Forward Windows Event Log entries using the LogZilla Windows Agent
  • Java Applications: Log4j and Log4j2 integration for enterprise applications
  • NGINX: Web server access and error logs with key-value parsing
  • BIND DNS: DNS server query and response logging
  • Avaya Communication Manager: Unified communications platform logs

Cloud and HTTP Sources

  • AWS CloudWatch: Forward CloudWatch logs via Kinesis Data Firehose
  • HTTP Event Receiver: Direct HTTP/HTTPS ingestion with JSON payloads for custom integrations and modern applications

Getting Started

  1. Configure LogZilla listeners: Verify syslog ports and HTTP receiver settings in the LogZilla interface
  2. Choose ingestion method: Select syslog, HTTP, or cloud-specific integration based on the data source
  3. Configure the sender: Follow device or application-specific setup guides in this section
  4. Verify reception: Confirm log delivery and troubleshoot connectivity if needed

For network troubleshooting and packet-level verification, see Syslog Troubleshooting.

Related Topics

Receiving Data | LogZilla Documentation