The Graylog Blog
A Study in Graylog’s Versatility
Graylog’s log aggregation and analysis capabilities are applicable to far more than just security. They can create new value in almost every business process or technical domain organizations want to improve, including regulation compliance, DevOps, and service resilience.
Supercharge Storage Optimization Via Graylog
Storage is one of the most promising ways to shift from the "more is better" philosophy to the "work smarter" philosophy. Find out how Graylog can help you create strategies to virtualize your storage, ensuring that you waste as little as possible and that services always get the storage they need. You can also optimize storage, so only the most important services use SSD.
Root Cause Analysis in IT: Collaborating to Improve Availability
Cloud IT stacks are more important to business operations than ever before. With Graylog, IT teams can collaborate when engaging in root cause analysis to ensure continued productivity.
Centralized Log Management and Cloud Environments
A centralized log management solution for cloud environment can help manage performance, availability, security, and ultimately IT costs amongst other things. In this blog post, we look at 5 key benefits that come from using log management to manage log data in cloud environments.
Importance of System Resource Monitoring on Graylog, Elasticsearch, and MongoDB Servers
The first thing we tell Graylog users is, “Monitor your disk space.” This is because it is critical that you know immediately if you are at risk of overloading the servers hosting Graylog, Elasticsearch, or MongoDB.
The Importance of Historical Log Data
Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.
What is IT Operations Analytics (ITOA)?
IT Operations Analytics (ITOA) is a vital asset to extract those valuable insights buried in piles of highly articulated data, and a powerful asset to sift through all the complexities of the Big Data.
Meeting Compliance Regulations with SIEM and Logging
Health, financial, and educational organizations often have standards and regulations that must be followed. See how SIEM and logging can help you gain compliance.
The Value of Threat Intelligence Automation
The news is full of stories about the talent shortage in IT, especially in IT security. This shortage has created pressure on organizations to grow IT operations and to do that securely, all while having too few staff.
Investigating the RCE attack that knocked out 900,000 German routers on Sunday
900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?