Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]| IETF Datatracker
Documentation for VictoriaMetrics, VictoriaLogs, Operator, Managed VictoriaMetrics and vmanomaly| docs.victoriametrics.com
Building and configuring syslog, HTTPS log drains and Telemetry drains| devcenter.heroku.com
I did a deep dive in Linux logging protocols for writing logbookd. Here are some of the results.| BrixIT Blog
This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way. This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen be...| IETF Datatracker
Log4j Core provides many lookups out-of-the-box:| logging.apache.org