Skip to main content

Sources for Installed Collectors

You can configure a variety of Sources on Installed Collectors.

In this section, we'll introduce the following concepts:

icon

Collect Windows Forwarded Events

Track and collect forwarded events from a Windows Event Collector.

icon

Docker Sources

Configure Docker Logs or a Docker Stats Source.

icon

Host Metrics Source

Collect host metrics from a local host.

icon

Local File Source

Collect log messages from the same machine where a collector is installed.

icon

Local Windows Event Log Source

Collect local performance data from the Windows Performance Monitor.

icon

Windows Event Source Custom Channels

Find Windows event channels to collect with a Local Windows Event Source.

icon

Local Windows Performance Monitor Log Source

Collect local performance data from the Windows Performance Monitor.

icon

Streaming Metrics Source

Add a streaming metrics source to collect Graphite, Carbon 2.0, or Prometheus metrics.

icon

Syslog Source

Obtain syslog messages by listening on a designated port.

icon

Define Boundary Regex for Multiline Messages

Detect when a log message spans multiple lines and then index it as a single message.

icon

Preconfigure a Machine to Collect Remote Windows Events

Configure a system for remote access by a Remote Windows Event Log Source.

icon

Preconfigure a Machine to Collect Remote Windows Performance Monitoring Logs

Collect log messages remotely from where a collector is installed.

icon

Windows Active Directory Inventory Source

Collect inventory data from Active Directory Database.

icon

Remote Windows Event Log Source

Collect Windows event log entries from multiple remote systems.

icon

Remote Windows Performance Monitor Log Source

Collect remote performance data from the Windows Performance Monitor.

icon

Script Action

This Script Action passes the results of a scheduled search to a script or program that runs on a machine.

Legal
Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.