Collection architecture
UTMStack’s log collection architecture consists of:- Collection layer: Agents, syslog receivers, and API connectors
- Parsing layer: Log normalization and field extraction
- Storage layer: Indexed data in OpenSearch/Elasticsearch
- Correlation layer: Real-time event correlation
Collection methods
Agent-based collection
Deploy UTMStack agents on Windows and Linux endpoints:- Windows
- Linux
- Windows Event Logs
- Sysmon events
- Application logs
- File integrity monitoring data
See Agent Management for detailed agent installation and configuration.
Syslog collection
Configure network devices and applications to send syslog to UTMStack:- RFC 3164 (BSD syslog)
- RFC 5424 (New syslog format)
- CEF (Common Event Format)
- LEEF (Log Event Extended Format)
Filebeat collection
For file-based log collection, configure Filebeat to ship logs:filebeat.yml
API-based collection
For cloud platforms and SaaS applications, UTMStack uses API connectors:- AWS: CloudWatch Logs API and S3 bucket monitoring
- Azure: Azure Monitor API
- GCP: Cloud Logging API
- Office 365: Management Activity API
API-based collection requires proper authentication credentials. See Integrations.
Data parsing
UTMStack includes 30+ pre-built parsers for common log formats:View supported log formats
View supported log formats
- Antivirus logs (Bitdefender, Sophos, etc.)
- AWS CloudTrail
- Azure Activity Logs
- Cisco ASA, IOS
- CrowdStrike Falcon
- Fortinet FortiGate
- GitHub audit logs
- Google Workspace
- Linux syslog
- macOS logs
- Microsoft Office 365
- Mikrotik RouterOS
- NetFlow/IPFIX
- Palo Alto Networks
- pfSense
- SonicWall
- Suricata IDS
- VMware vCenter
- Windows Event Logs
Collection performance
Throughput limits (per UTMStack server):| Server Size | Events/Second | Daily Volume |
|---|---|---|
| Small (4 cores, 16GB) | 5,000 | 400M events |
| Medium (8 cores, 16GB) | 10,000 | 850M events |
| Large (16 cores, 32GB) | 20,000 | 1.7B events |
| XLarge (32 cores, 64GB) | 40,000+ | 3.4B+ events |
Monitoring collection health
Monitor collection status in the UTMStack dashboard:- Navigate to Data Sources → Status
- View real-time metrics:
- Events per second
- Parser success rate
- Data source connectivity
- Parsing errors
Best practices
Optimize log collection
Optimize log collection
- Use agents for endpoints: More reliable than syslog forwarding
- Enable TLS for syslog: Encrypt logs in transit
- Implement log filtering: Filter noisy sources at the collector
- Monitor collection rates: Set up alerts for collection failures
- Balance data sources: Distribute high-volume sources across collectors
Troubleshoot collection issues
Troubleshoot collection issues
No data from source:
- Verify network connectivity
- Check firewall rules
- Validate authentication credentials
- Review parser configuration
- Check log format matches parser
- Review parsing error logs
- Consider custom parser
- Check CPU and memory usage
- Review event rate trends
- Consider horizontal scaling
Next steps
Configure syslog
Set up syslog receivers
Deploy Filebeat
Configure file-based collection
Custom parsers
Create custom log parsers
Monitor health
Monitor collection metrics