Blog
Stay in the loop: Updates, Innovations, and Community Insights
Featured Articles


10x search improvement? Optimize Splunk fields with Axoflow
Sending indexed fields can make your Splunk instance run far more efficiently. This post shows how easily you can send payload- and externally-derived metadata to Splunk with Axoflow.


Beyond Cutting Cost: Why Data Quality Makes Security Pipelines Strategic
Anton Chuvakin and Tim Peacock interview Balázs Scheidler (Axoflow CEO and syslog-ng founder) about the industry’s move from centralization to data access. They discuss why poor data quality weakens SIEM value, how modern pipelines normalize and enrich data so it is ready for immediate use, and meet data quality requirements.


Axoflow’s Storage Strategy: Building the Security Data Layer
Discover Axoflow’s storage solutions for the Security Data Layer. From edge storage and cost-efficient data lakes to stream processing and air-gapped deployments, learn how Axoflow powers scalable, flexible, and reliable security data pipelines.
All Articles


Syslog Scaling and Performance Considerations
Learn how syslog scales in high-volume environments. Explore performance bottlenecks, buffering, backpressure, batching, and architectural patterns for reliable log ingestion.


Syslog in Practice: Use Cases and Integrations
Learn how syslog is used in practice across operating systems, network devices, applications, and security platforms. Explore common integrations with SIEMs and observability tools.


Syslog Deployment Modes: From Local Logs to Enterprise Pipelines
Explore common syslog deployment models, including local, centralized, distributed, and high-availability setups. Learn how syslog scales from single hosts to SIEM-backed enterprise pipelines.


The Autonomous Data Layer: Control Your Data, Cost, and Cyber Risk
Gain strategic control with the Axoflow autonomous data layer. Leverage Axolake, AxoStore, and Axoflow Locker for automated curation, cost reduction, and compliance.


How Syslog Works: Core Concepts Explained
Learn how syslog works, including message format, severity levels, facilities, transport protocols (UDP, TCP, TLS), and reliability mechanisms like buffering and queuing.


Why Use OpenTelemetry gRPC for Log Data Transport
If you're transporting log data, switching from syslog or HTTP to gRPC can dramatically improve efficiency, reliability, and scalability. Read our blog to learn why.


What is Syslog? The Complete Beginner’s Guide (2026)
Learn what syslog is, how it works, and why it remains the backbone of modern logging. Explore use cases, benefits, and limitations in this beginner-friendly guide.


Comprehensive Guide to Syslog (2026)
The starting point of our comprehensive syslog guide, that starts from the basics and covers every aspect of syslog collection, transport, and scaling


If You Own the Pipeline, You Own the Future of the SOC
Security Data Pipeline report highlights the importance of pipelines that deliver cost efficiency, improved data quality, faster investigations, cleaner enrichment, better telemetry reliability for your SOC teams.
Subscribe to stay in touch
Sign up for our newsletter to be the first to knew about new articles. We are excited to be realizing our vision above with a full Axoflow product suite.
