Syslog Destination
Cribl Stream supports sending out data over syslog via TCP or UDP.
Type: Streaming | TLS Support: Configurable | PQ Support: Yes
This Syslog Destination supports RFC 3164 and RFC 5424. Before you configure this Destination, review Syslog Format Options and Structure Syslog Output below. This will help you ensure that your configuration will structure RFC-compliant outbound events that downstream services can read.
Configure Cribl Stream to Output Data in Syslog Format
On the top bar, select Products, and then select Cribl Stream. Under Worker Groups, select a Worker Group. Next, you have two options:
- To configure via QuickConnect, navigate to Routing > QuickConnect (Stream) or Collect (Edge). Select Add Destination and select the Destination you want from the list, choosing either Select Existing or Add New.
- To configure via the Routes, select Data > Destinations or More > Destinations (Edge). Select the Destination you want. Next, select Add Destination.
In the New Destination modal, configure the following under General Settings:
- Output ID: Enter a unique name to identify this Syslog definition. If you clone this Destination, Cribl Stream will add
-CLONE
to the original Output ID. - Description: Optionally, enter a description.
- Protocol: The network protocol to use for sending out syslog messages. Defaults to
TCP
;UDP
is also available. - Load balancing: Cribl Stream displays this option only when the Protocol is set to
TCP
. Toggle on to specify multiple destinations. See Load Balancing Settings below.
Turning Load balancing off displays the following two additional fields:Address: Address/hostname of the receiver.
Port: Port number to connect to on the host.
If Load balancing is disabled and you notice that Cribl Stream is not sending data to all possible IP addresses, enable Advanced Settings > Round-robin DNS.- Record size limit: Displayed when Protocol is set to
UDP
. Sets the maximum size of syslog messages. Defaults to1500
, and must be ≤2048
. To avoid packet fragmentation, keep this value less than or equal to the MTU (maximum transmission unit) for the network path to the downstream receiver. When the message length exceeds the size limit, it is truncated and followed with an ellipsis ("…").
- Output ID: Enter a unique name to identify this Syslog definition. If you clone this Destination, Cribl Stream will add
Next, you can configure the following Optional Settings:
Facility: Default value for message facility. If set, will be overwritten by the value of
__facility
. Defaults touser
.Severity: Default value for message severity. If set, will be overwritten by the value of
__severity
. Defaults tonotice
.App name: Default value for application name. If set, will be overwritten by the value of
__appname
. Defaults toCribl
.Message format: The syslog message format supported by the receiver. Defaults to
RFC3164
.Timestamp format: The timestamp format to use when serializing an event’s time field. Options include
Syslog
(default) andISO8601
. For details, see Timestamp format below.Throttling: Throttle rate, in bytes per second. Defaults to
0
, meaning no throttling. Multiple-byte units such as KB, MB, or GB are also allowed – for example,42 MB
. When throttling is engaged, your Backpressure behavior selection determines whether Cribl Stream will handle excess data by blocking it, dropping it, or queueing it to disk. For details, see Throttling below.Backpressure behavior: Select whether to block, drop, or queue events when all receivers are exerting backpressure. (Causes might include a broken or denied connection, or a rate limiter.) Defaults to
Block
.Tags: Optionally, add tags that you can use to filter and group Destinations on the Destinations page. These tags aren’t added to processed events. Use a tab or hard return between (arbitrary) tag names.
Optionally, you can adjust the Persistent Queue, TLS, Processing, Timeout, and Advanced settings outlined in the sections below.
Select Save, then Commit & Deploy.
Load Balancing Settings
Load balancing is available only when the Protocol is set to
TCP
.
Toggling Load balancing on replaces the static General Settings > Address and Port fields with the following controls:
Exclude current host IPs: Appears when Load balancing is toggled on. It determines whether to exclude all IPs of the current host from the list of any resolved hostnames. Default is toggled off, which keeps the current host available for load balancing.
Destinations
Use the Destinations table to specify a known set of receivers on which to load-balance data. To specify more receivers on new rows, click Add Destination. Each row provides the following fields:
Address: Hostname of the receiver. Optionally, you can paste in a comma-separated list, in <host>:<port>
format.
Port: Port number to send data to on this host.
TLS: Whether to inherit TLS configs from group setting, or disable TLS. Defaults to inherit
.
TLS servername: Servername to use if establishing a TLS connection. If not specified, defaults to connection host (if not an IP). Otherwise, uses the global TLS settings.
Load weight: Set the relative traffic-handling capability for each connection by assigning a weight (> 0
). This column accepts arbitrary values, but for best results, assign weights in the same order of magnitude to all connections. Cribl Stream will attempt to distribute traffic to the connections according to their relative weights.
The final column provides an X
button to delete any row from the table.
For details on configuring all these options, see About Load Balancing.
Timestamp Format
For Syslog
, the timestamp format is Mmm dd hh:mm:ss
, using the timezone of the syslog device. For example: Jan 18 16:56:36
.
For ISO8601
, the basic timestamp format is YYYY‑MM‑DD
. For example: 2023‑01‑18
. For extended formats, add hours, minutes, seconds, decimal fractions (optional), and timezone. For example: 2023‑01‑18T16:56:36.996‑08:00
.
Throttling
When Throttling is used in conjunction with Max connections, the throttling rate is applied per connection. For instance, if Max connections is set to 2
and throttling is set to 3 MB
, each of the two connections can send data at a rate of up to 3 MB per second, resulting in a total potential throughput of 6 MB per second across both connections.
Persistent Queue Settings
The Persistent Queue Settings tab displays when the Backpressure behavior option in General settings is set to Persistent Queue. Persistent queue buffers and preserves incoming events when a downstream Destination has an outage or experiences backpressure.
Before enabling persistent queue, learn more about persistent queue behavior and how to optimize it with your system:
- About Persistent Queues
- Optimize Destination Persistent Queues (dPQ)
- Destination Backpressure Triggers
On Cribl-managed Cloud Workers (with an Enterprise plan), this tab exposes only the destructive Clear Persistent Queue button (described at the end of this section). A maximum queue size of 1 GB disk space is automatically allocated per PQ‑enabled Destination, per Worker Process. The 1 GB limit is on outbound uncompressed data, and no compression is applied to the queue.
This limit is not configurable. If the queue fills up, Cribl Stream/Edge will block outbound data. To configure the queue size, compression, queue-full fallback behavior, and other options below, use a hybrid Group.
Mode: Use this menu to select when Cribl Stream/Edge engages the persistent queue in response to backpressure events from this Destination. The options are:
Mode | Description |
---|---|
Error | Queues and stores data on a disk only when the Destination is in an error state. |
Backpressure | After the Destination has been in a backpressure state for a specified amount of time, Cribl Stream/Edge queues and stores data to a disk until the backpressure event resolves. |
Always on | Cribl Stream/Edge immediately queues and stores all data on a disk for all events, even when there is no backpressure. |
If a Worker/Edge Node starts with an invalid Mode setting, it automatically switches to Error mode. This might happen if the Worker/Edge Node is running a version that does not support other modes (older than 4.9.0), or if it encounters a nonexistent value in YAML configuration files.
File size limit: The maximum data volume to store in each queue file before closing it. Enter a numeral with units of KB, MB, etc. Defaults to 1 MB
.
Max queue size: The maximum amount of disk space that the queue can consume on each Worker Process. When the queue reaches this limit, the Destination stops queueing data and applies the Queue‑full behavior. Defaults to 5
GB. This field accepts positive numbers with units of KB
, MB
, GB
, and so on. You can set it as high as 1 TB
, unless you’ve configured a different Worker Process PQ size limit on the Group Settings/Fleet Settings page.
Queue file path: The location for the persistent queue files. Defaults to $CRIBL_HOME/state/queues
. Cribl Stream/Edge will append /<worker‑id>/<output‑id>
to this value.
Compression: Set the codec to use when compressing the persisted data after closing a file. Defaults to None
. Gzip
is also available.
Queue-full behavior: Whether to block or drop events when the queue begins to exert backpressure. A queue begins to exert backpressure when the disk is low or at full capacity. This setting has two options:
- Block: The output will refuse to accept new data until the receiver is ready. The system will return block signals back to the sender.
- Drop new data: Discard all new events until the backpressure event has resolved and the receiver is ready.
Backpressure duration Limit: When Mode is set to Backpressure
, this setting controls how long to wait during network slowdowns before activating queues. A shorter duration enhances critical data loss prevention, while a longer duration helps avoid unnecessary queue transitions in environments with frequent, brief network fluctuations. The default value is 30
seconds.
Strict ordering: Toggle on (default) to enable FIFO (first in, first out) event forwarding, ensuring Cribl Stream/Edge sends earlier queued events first when receivers recover. The persistent queue flushes every 10 seconds in this mode. Toggle off to prioritize new events over queued events, configure a custom drain rate for the queue, and display this option:
- Drain rate limit (EPS): Optionally, set a throttling rate (in events per second) on writing from the queue to receivers. (The default
0
value disables throttling.) Throttling the queue drain rate can boost the throughput of new and active connections by reserving more resources for them. You can further optimize Worker startup connections and CPU load in the Worker Processes settings.
Clear Persistent Queue: For Cloud Enterprise only, click this button if you want to delete the files that are currently queued for delivery to this Destination. If you click this button, a confirmation modal appears. Clearing the queue frees up disk space by permanently deleting the queued data, without delivering it to downstream receivers. This button only appears after you define the Output ID.
Use the Clear Persistent Queue button with caution to avoid data loss. See Steps to Safely Disable and Clear Persistent Queues for more information.
TLS Settings (Client Side)
Enabled: Defaults to toggled off. When toggled on:
Validate server certs: Reject certificates that are not authorized by a CA in the CA certificate path, or by another trusted CA – for example, the system’s CA. Defaults to toggled on.
Server name (SNI): Server name for the SNI (Server Name Indication) TLS extension. This must be a host name, not an IP address.
Minimum TLS version: Optionally, select the minimum TLS version to use when connecting.
Maximum TLS version: Optionally, select the maximum TLS version to use when connecting.
Certificate name: The name of the predefined certificate.
CA certificate path: Path on client containing CA certificates (in PEM format) to use to verify the server’s cert. Path can reference $ENV_VARS
.
Private key path (mutual auth): Path on client containing the private key (in PEM format) to use. Path can reference $ENV_VARS
. Use only if mutual auth is required.
Certificate path (mutual auth): Path on client containing certificates in (PEM format) to use. Path can reference $ENV_VARS
. Use only if mutual auth is required.
Passphrase: Passphrase to use to decrypt private key.
Timeout Settings
These timeout settings apply only to the TCP protocol.
Connection timeout: Amount of time (in milliseconds) to wait for the connection to establish, before retrying. Defaults to 10000
.
Write timeout: Amount of time (milliseconds) to wait for a write to complete, before assuming connection is dead. Defaults to 60000
.
Processing Settings
Post‑Processing
Pipeline: Pipeline or Pack to process data before sending the data out using this output.
System fields: A list of fields to automatically add to events that use this output. By default, includes cribl_pipe
(identifying the Cribl Stream Pipeline that processed the event). Supports wildcards. Other options include:
cribl_host
– Cribl Stream Node that processed the event.cribl_input
– Cribl Stream Source that processed the event.cribl_output
– Cribl Stream Destination that processed the event.cribl_route
– Cribl Stream Route (or QuickConnect) that processed the event.cribl_wp
– Cribl Stream Worker Process that processed the event.
Advanced Settings
The first three options are always displayed:
Octet count framing: When enabled, Cribl Stream prefixes messages with their byte count, regardless of whether the messages are constructed from message
or __syslogout
. When disabled, Cribl Stream omits prefixes, and instead appends a \n
to messages. RFCs 5425 and 6587 describe how octet counting works in syslog.
Log failed requests to disk: Toggle on to make the payload of the most recently failed request available for inspection. See Inspect Payload to Troubleshoot Closed Connections below.
Environment: If you’re using GitOps, optionally use this field to specify a single Git branch on which to enable this configuration. If empty, the config will be enabled everywhere.
The following options are added if you enable the General Settings tab’s Load balancing option:
DNS resolution period (seconds): Re-resolve any hostnames after each interval of this many seconds, and pick up destinations from A records.
- For TCP: This helps maintain up-to-date IP addresses for your TCP connections. Defaults to
600
seconds. - For UDP: This reduces the frequency of DNS lookups for UDP destinations, improving performance. Defaults to
0
seconds, meaning DNS lookups occur for every outgoing message.
Load balance stats period (seconds): Lookback traffic history period. Defaults to 300
seconds. If multiple receivers – that is, multiple A records – are behind a hostname, all resolved IPs will inherit the weight of the host unless each IP is specified separately. In Cribl Stream load balancing, IP settings take priority over those from hostnames.
Max connections: Constrains the number of concurrent receiver connections per Worker Process, to limit memory utilization. If you set this to a number greater than 0
, Cribl Stream will randomly select that many discovered IPs to connect to on every DNS resolution period. Cribl Stream will rotate IPs in future resolution periods – monitoring weight and historical data, to ensure fair load balancing of events among IPs.
Inspect Payload to Troubleshoot Closed Connections
When a downstream receiver closes connections from this Destination (or just stops responding), inspecting the payload of the most recently failed request can help you find the cause. For example:
- Suppose you send an event whose size is larger than the downstream receiver can handle.
- Suppose you send an event that has a
number
field, but the value exceeds the highest number that the downstream receiver can handle.
When Log failed requests to disk is enabled, you can inspect the last failed request payload. Here is how:
- In the Destination UI, navigate to the Logs tab.
- Find a log entry with a
connection error
message. - Expand the log entry.
- If the message includes the phrase
See payload file for more info
, note the path in thefile
field on the next line.
Now you have the path to the directory where Cribl Stream is storing the payload from the last failed request.
Internal Fields
Cribl Stream uses a set of internal fields to assist in forwarding data to downstream services. Fields for this Destination:
__priority
__facility
__severity
__procid
__appname
__msgid
__syslogout
Syslog Format Options
Unlike other Cribl Stream Destinations, the Syslog Destination applies an additional post-processing step after the Pipeline(s) transform events. This additional step structures the data for compliance with the syslog transport protocol (RFC 3164 and/or RFC 5424) before it is transmitted to downstream services.
- With RFC 3164-compliant messages, you’ll get
priority
,timestamp
,host
, andmessage
, such thatmessage
includesappname
andprocid
. You will not getmsgid
orSTRUCTURED-DATA
. - With RFC 5424-compliant messages – that is, structured data – Cribl Stream will send the contents of
event.structuredData
, whether or not that content is valid according to the RFC. Cribl Stream will make no attempt to frame, enclose, or validate the data. If present, structured data should be in the form[ SD-ID *PARAM-NAME=PARAM-VALUE]
but Cribl Stream will not enforce this. Cribl Stream will send whatever is in that field, or, if the field is missing, send a dash (-
).
In General Settings, you can format the timestamps, format the message delivering the event, and set defaults for Facility, Severity, and App name (in RFC 5424, these are Facility, Severity, and APP-NAME, respectively).
Here is an example of an RFC 3164-compliant syslog event:
<13>Jul 11 10:34:35 testbox testing[42]
Here is an example of an RFC 5424-compliant syslog event:
<214>1 2022-07-11T18:58:45.000Z testbox testapp 42 - [exampleSDID@32473 iut="3" foo="bar" this="that"] Here is a message
Structure Syslog Output
Two approaches are available for specifying how the Syslog Destination will structure its output. One relies on the message
field, and the other relies on the __syslogout
field. The Syslog Destination determines what to do based on whether or not those fields are set, as the flowchart below makes clear.
Use
message
(Simplest Approach): Cribl recommends using this option, which requires you to configuremessage
and to leave__syslogout
unset. Whenmessage
is defined, Cribl Stream discards_raw
and composes a new payload using the other syslog-related fields. Cribl Stream automatically processes the values of themessage
,_time
,host
, and other fields, and creates an ISO-compliant timestamp and a properly formatted event. In the flowchart, the rounded rectangle that reads “Use message + other fields …” represents this approach.Export
__syslogout
(Alternative Approach): When you define__syslogout
, Cribl Stream sends this field and its value as the entire syslog message, discards_raw
, and ignores all the other fields. In the flowchart, the rounded rectangle that reads “Send __syslogout …” represents this approach.
As the flowchart shows, if neither message
nor __syslogout
are set, Cribl Stream uses the existing _raw
field as the message
field
(with or without a header), and prepends all the other syslog-related fields to the event. While this could be considered a third approach, Cribl does not recommend it, and we will not describe it further in this topic.

Before you configure this Destination, review the subsection below that explains the approach that you prefer.
Use message
(Simplest Approach)
Cribl recommends this approach for environments where events enter Cribl Stream from the Syslog Source, because that Source supplies all required fields.
This approach is the simplest and least error-prone because Cribl Stream creates the payload for you. The following fields are required:
facility
severity
_time
host
message
Cribl Stream will create a new syslog-adherent payload using these required fields. See Field Logic and Behavior below. To specify which RFC your events should adhere to, use General Settings > Optional Settings > Message format.
If these optional fields are included in the event, Cribl Stream will use them appropriately when constructing the payload:
appname
host
procid
msgid
(RFC 5424 only)structuredData
(RFC 5424 only)
Field Logic and Behavior
Let’s examine the fields in a syslog-formatted event. Keep in mind that if Severity, Facility, or APP-NAME are not set on the event, Cribl Stream defaults to the corresponding value(s) configured in the Syslog Destination (Severity, Facility, and App name, respectively).
__priority
: If this field is present Cribl Stream will use it and ignorefacility
andseverity
.The version (used for RFC 5424 only, and not a field that you can set) follows priority (with no spaces in between).
__facility
orfacility
: Cribl Stream uses this field to calculate priority. The RFCs define Facility codes.__severity
orseverity
: Cribl Stream also uses this field to calculate priority. The RFCs define Severity levels.
Use either (a) __facility
and __severity
or (b) facility
and severity
. For these fields, avoid mixing double-underscore naming with no-underscore naming, because if you mix them, Cribl Stream will ignore one of them and you will get unintended results.
If
__priority
is not set, Cribl Stream calculates the Priority from the values of Severity and Facility. Cribl Stream uses the formula: Priority = ((8 * Facility) + Severity).
- For example, if the
facility
is13
(Security) and theseverity
is2
(Critical), thepriority
will be(13 * 8) + 2 = 106
.
Now let’s look at the rest of the fields. The list below shows field names in priority order: if both __appname
and appname
are present, Cribl Stream uses __appname
.
_time
: The value of_time
in Cribl events is in epoch format, but the syslog RFCs dictate that each event’s timestamp must be in human-readable format (see TIMESTAMP in RFC 3164 or RFC 5424). When defining a Syslog Destination, you configure this with General Settings > Timestamp format. TheISO8601
option (ISO 8601 format) defines the method for specifying time zone and year, while the olderSyslog
format lacks this information. For this reason, Cribl recommendsISO8601
.host
: the value for the required host field in a syslog event (see HOSTNAME in RFC 3164 or RFC 5424), following the timestamp.__appname
orappname
: The required application name (APP-NAME in RFC 5424). This is typically the name of the daemon or process that is logging any given event.__procid
orprocid
: This optional field (PROCID in RFC 5424) is the Process ID. Use a numeric value, optionally surrounded with brackets – for example,[4321]
. Cribl Stream will automatically adjust the spaces and syntax to ensure RFC-compliant formatting.__msgid
ormsgid
: This optional field (MSGID in RFC 5424 only) is the Message ID.structuredData
: This optional field (STRUCTURED-DATA in RFC 5424 only) contains a namespace and zero or more key-value pairs. Cribl Stream does not validate whether it adheres to the RFC.
Export __syslogout
(Alternative Approach)
The most common use of this approach is to send to a non-syslog downstream receiver such as a raw TCP listener. While there is no native “raw TCP” Destination in Cribl Stream, this approach – where you configure a Syslog Destination with the TCP protocol and
__syslogout
– can be an effective method for delivering raw data over TCP to a downstream receiver that does not enforce syslog RFCs.
When you set __syslogout
, that field becomes the entire syslog message sent. Neither _raw
nor any other metadata are sent downstream.
If you enable Octet count framing, Cribl Stream will prepend the number of bytes of the constructed __syslogout
field to the message before sending it.
Cribl Stream does not check whether the value of __syslogout
is RFC-compliant. This means that to send proper, RFC-compliant syslog messages, you must manually construct the __syslogout
payload, starting with _time
, for all the fields that Cribl Stream would automatically handle with the first approach above.
If the value of
__syslogout
fails to adhere to the syslog RFCs, a downstream syslog server may misinterpret the event; drop non-compliant events entirely; or, try to “fix” the format by supplying missing fields.
Troubleshooting
The Destination’s configuration modal has helpful tabs for troubleshooting:
Live Data: Try capturing live data to see real-time events as they flow through the Destination. On the Live Data tab, click Start Capture to begin viewing real-time data.
Logs: Review and search the logs that provide detailed information about the delivery process, including any errors or warnings that may have occurred.
Test: Ensures that the Destination is correctly set up and reachable. Verify that sample events are sent correctly by clicking Run Test.
You can also view the Monitoring page that provides a comprehensive overview of data volume and rate, helping you identify delivery issues. Analyze the graphs showing events and bytes in/out over time.