Features in free and licensed editions
This documentation is for legacy Kiwi Syslog Server versions 9.8.2 and older.
When you initially install Kiwi Syslog Server, all features are available during a 14-day trial period. When the trial period ends, you can continue to use the free edition with limited features without purchasing a license. Or you can enter a license key to access the full features in the licensed edition.
Overview of KSS licensed features
With the licensed edition of Kiwi Syslog Server, you can:
- Receive messages from an unlimited number of devices.
- Automatically split logs by device, functional role, or message contents to improve log organization.
- Implement your log retention policy with automatic archival and clean-up tasks.
- View messages from anywhere using Kiwi Syslog Web Access, a secure Web viewer.
- Apply message highlighting rules and DNS resolution of obscure IP addresses to help you quickly find the information you need.
- Forward messages to other syslog servers, databases (such as SQL Server), the Windows Event Log, SNMP, or other email addresses. You can configure Kiwi Syslog Server to act as a "syslog proxy" (spoof) and forward messages with original source information in the forwarded messages.
- Set up filters to react to specified message content, types of messages, messages sent at specified times, or a number of similar messages (such as five alerts in a row).
- Configure additional actions, including sending email notifications, playing sounds, running scripts, and running executables. Scripts and executables can be used to implement advanced filters and actions.
Detailed comparison of KSS free and licensed features
|Free edition||Licensed edition|
|Syslog (UDP and TCP)|
|Logging to disk|
|Write logs to disk|
|Split by priority|
|Split by time of day|
|Split by IP or host name|
|Split by network|
|Split on message content|
|Split by input source (UPD, TCP, or SNMP)|
|Log file retention|
|Unique log per day|
|Rotate on number of files|
|Rotate on file size|
|Rotate on file age|
|Custom font and color|
|DNS resolution of IPs|
|To syslog (UDP or TCP)|
|To Windows Event Log|
|As proxy (spoofed source)|
|By time received|
|By host name or IP address of sending device|
|By message text|
|By input source|
|By count of similar messages|
|Reacting to messages|
|High traffic alert|
|Configuring server and rules|
|Tray icon status|
|GUI management application|
|Secure Web access|