Graylog Illuminate provides pre-built content designed with common cybersecurity and log management questions in mind to give you the fast start you need for success. Available with Graylog Operations and Graylog Security, our pre-built content better equips you to monitor and manage challenges that can range from unlocking passwords to hunting for that bad actor that breached your network.

SEE DEMO

Start Fast With Pre-Built Content

Help Me See My Data

Out-of-the-box Content for Graylog Operations & Graylog Security

Correlation and Alerting

Receive alerts via email, text, Slack, and more. Update alert criteria based on a dynamic list in a lookup table.
Learn more
Learn more

Dashboards

Combine widgets to build customized data displays and automate the delivery of reports to your inbox.
Learn more
Learn more

Dynamic Lookup Tables

Perform faster research by adding WHOIS, IP Geolocation, threat intelligence, or other structured data.
Learn more
Learn more

Schedule Reports

Leverage Graylog’s dashboard functionality to easily build and configure scheduled reports.
Learn more
Learn more

Search Templates

Enter one or more criteria for a more comprehensive search or dashboard view. Easily save and share parameterized searches and dashboards.
Learn more
Learn more

Streams & Pipelines

Route log messages into categories in real time and control data processing by tying streams to your pipelines.
Learn more
Learn more

FREQUENTLY ASKED QUESTIONS

Is Illuminate available with Graylog Open Source?
No, Illuminate is only available with Graylog Enterprise.
How do I install Illuminate?
Graylog comes with a UI for installing Illuminate core, processing, and pipelines. This automated installation process takes care of everything under the covers -- i.e., it updates Elasticsearch templates, installs new processing pipelines and rules, installs new CSV lookups, and syncs the Illuminate installation across all nodes in your cluster.