In the need to centralize logs we have selected syslog as the collector and Splunk (free for now) as the analysis tool, but there's always the question about which events should get to the central repository and from which systems.
The selection should address only those logs of interest from a security point of view.
Which logs do you centralize and how do you select them?
The answers should indicate types of devices, systems or software, types of logs/events and the reason for choosing them.