Create Rsyslog integration
Add Rsyslog integration endpoint
Add the remote syslog server you want to send logs to in the project that contains the service you want to integrate.Using Aiven Console
Access integration endpoints
Navigate to the Integration endpoints page in the Aiven Console.
Create new Syslog endpoint
Select Create new Syslog endpoint and configure the connection parameters.
Using Aiven CLI
Configuration parameters
Required parameters
| Parameter | Description |
|---|---|
server | DNS name or IPv4 address of the server |
port | Port to connect to |
format | Message format: rfc3164 (old BSD style), rfc5424 (current syslog), or custom |
tls | Use TLS encryption (highly recommended as logs may contain sensitive information) |
Conditional parameters
Required ifformat=custom:
| Parameter | Description |
|---|---|
logline | Syslog log line template for custom format, supporting limited rsyslog style templating using %tag% |
HOSTNAME, app-name, msg, msgid, pri, procid, structured-data, timestamp, and timestamp:::date-rfc3339.
Optional parameters
| Parameter | Description |
|---|---|
sd | Content of the structured data block for rfc5424 messages |
ca | Certificate Authority in PEM format for verifying server certificates |
key | Client key in PEM format if server requires client authentication |
cert | Client certificate in PEM format |
max_message_size | Maximum rsyslog message size (default: 8192 bytes) |
Enable Rsyslog integration on a service
Using Aiven Console
Navigate to service
In the Aiven Console, go to the Overview page of the target service.
Using Aiven CLI
Platform-specific configurations
All integrations can be configured using the Aiven Console or the Aiven CLI, though the examples below use CLI for easier copying.
Coralogix
For Coralogix integration, use a customlogline format with your key and company ID.
The Syslog endpoint depends on your account:
- Ends with
.com: usesyslogserver.coralogix.com - Ends with
.us: usesyslogserver.coralogix.us - Ends with
.in: usesyslogserver.app.coralogix.in
For Coralogix,
tls needs to be set to false.Loggly
For Loggly integration, use a customlogline format with your token.
TOKEN with your Loggly customer token.
Mezmo (LogDNA)
For Mezmo syslog integration, use a customlogline format with your key.
YOUR_KEY_GOES_HERE with your Mezmo ingestion key.
New Relic
For New Relic syslog integration, use a customlogline format prepended with your New Relic License Key. The format matches the built-in Grok pattern.
The server value depends on account location:
- EU region:
newrelic.syslog.eu.nr-data.net(US endpoint will not work for EU accounts) - Other regions:
newrelic.syslog.nr-data.net
YOUR_LICENSE_KEY with your New Relic license key.
See Use TCP endpoint to forward logs to New Relic for more information.
Papertrail
Papertrail identifies clients based on the server and port combination. Copy the values from your Papertrail “Log Destinations” page.- Use
format=rfc3164for Papertrail - You don’t need the ca-bundle as Papertrail servers use certificates signed by a known CA
- Replace
logsN.papertrailapp.comandXXXXXwith your specific values from Papertrail
Sumo Logic
For Sumo Logic, use a customlogline format with your collector token.
Replace YOUR_DEPLOYMENT with one of: au, ca, de, eu, fed, in, jp, us1, or us2.
YOUR_TOKEN with your Sumo Logic collector token.
See Cloud Syslog Source for more information.
Syslog format reference
RFC3164 (BSD Syslog)
The older BSD syslog format:- Limited structure
- No standardized timestamp format
- Simpler message format
- Used by legacy systems
RFC5424 (Current Syslog)
The current syslog protocol standard:- Structured data support
- Standardized timestamp format (RFC3339)
- Better international character support
- Recommended for new integrations
Custom format
Allows full control over the log line template:- Use rsyslog-style tags:
%tag% - Combine with JSON or other formats
- Required for some third-party platforms
- Most flexible option
Troubleshooting
Logs not appearing
- Verify the remote server address and port are correct
- Check that TLS is enabled if required by the remote server
- Confirm the log format matches the server’s expectations
- Review any custom logline template for syntax errors
- Ensure the integration is enabled on your service
Connection failures
- Verify network connectivity to the remote server
- Check firewall rules allow outbound connections on the specified port
- Confirm the remote server is accepting connections
- Review CA certificate if using custom or self-signed certificates
Authentication errors
- Verify API keys or tokens are correct and active
- Check that client certificates and keys are in PEM format
- Confirm the remote server is configured for client authentication
- Review credential permissions on the remote platform
Message format issues
- Ensure the format parameter matches server expectations
- Verify custom logline templates use valid tags
- Check that special characters are properly escaped
- Review max_message_size if logs are being truncated
Related resources
The Loggly trademark is the exclusive property of SolarWinds Worldwide, LLC or its affiliates, is registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration.