The Graylog Blog


A Study in Graylog’s Versatility

November 3, 2021

Graylog’s log aggregation and analysis capabilities are applicable to far more than just security. They can create new value in almost every business process or technical domain organizations want to improve, including regulation compliance, DevOps, and service resilience.

Supercharge Storage Optimization Via Graylog

August 18, 2021

Storage is one of the most promising ways to shift from the "more is better" philosophy to the "work smarter" philosophy. Find out how Graylog can help you create strategies to virtualize your storage, ensuring that you waste as little as possible and that services always get the storage they need. You can also optimize storage, so only the most important services use SSD. 

Root Cause Analysis in IT: Collaborating to Improve Availability

April 21, 2021

Cloud IT stacks are more important to business operations than ever before. With Graylog, IT teams can collaborate when engaging in root cause analysis to ensure continued productivity. 

Centralized Log Management and Cloud Environments

January 27, 2021

A centralized log management solution for cloud environment can help manage performance, availability, security, and ultimately IT costs amongst other things. In this blog post, we look at 5 key benefits that come from using log management to manage log data in cloud environments. 

Importance of System Resource Monitoring on Graylog, Elasticsearch, and MongoDB Servers

July 2, 2020

The first thing we tell Graylog users is, “Monitor your disk space.” This is because it is critical that you know immediately if you are at risk of overloading the servers hosting Graylog, Elasticsearch, or MongoDB.

The Importance of Historical Log Data

May 21, 2020

Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.

What is IT Operations Analytics (ITOA)?

August 29, 2019

IT Operations Analytics (ITOA) is a vital asset to extract those valuable insights buried in piles of highly articulated data, and a powerful asset to sift through all the complexities of the Big Data.

Meeting Compliance Regulations with SIEM and Logging

December 18, 2018

Health, financial, and educational organizations often have standards and regulations that must be followed. See how SIEM and logging can help you gain compliance.

The Value of Threat Intelligence Automation

March 22, 2018

The news is full of stories about the talent shortage in IT, especially in IT security. This shortage has created pressure on organizations to grow IT operations and to do that securely, all while having too few staff.

Investigating the RCE attack that knocked out 900,000 German routers on Sunday

November 28, 2016

900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?

Ready to get started?

Get Graylog