Collection technology facilitates the aggregation of log data, security events and other machine data. Data collectors can operate locally or remotely and are centrally monitored and managed to simplify deployment and management. Deployment scalability is enhanced by application load balancing between data processors. Data is transmitted from Data Collectors via authenticated and encrypted TLS communications that can be compressed
to minimize bandwidth utilization. Data Collectors can be configured for unidirectional network communication paths, supporting classified environments and regulatory compliance objectives. Data Collectors ensure data integrity during network interruption by intelligently spooling volatile UDP traffic and tracking state for non-volatile data. Resilience is further buttressed through automatic failover between Data Processors.