Log Files Access
Last updated
Last updated
Able to accept inputs from a wide variety of services, transform them, and output the results to diverse network destinations.
Over TCP and/or SSL/TLS.
Timing is controlled by the monitored node/device.
Many post- and cross-processing tasks can be made on the monitored node/device.
Using any remote access to remote files.
Requires special permissions.
SSH/SCP, SFTP, etc...
Timing is controlled by a central point.
Requires all heavy post- and cross-processing in a central point.