The Graylog Blog
Using Pipelines for Windows Log Processing
Use Graylog pipelines to enrich your logs and make them easier to read.
Log Indexing and Rotation for Optimized Archival in Graylog
How do I rotate around my logs and configure them in Graylog? Let's talk about the best practices around log retention and how to configure them in Graylog.
Windows Filebeat Configuration and Graylog Sidecar
Graylog sidecar can create and manage a centralized configuration for a filebeat agent, to gather logs from a local server that is not part of the Windows Event Channel and across all your infrastructure hosts.
Making data-driven decisions with log management software
Data-driven decisions certainly are more reliable than those based upon mere instinct, and logs are a fantastic source of information to fuel a company's business intelligence strategies.
Turning Unstructured Data Into Structured Data With Log Management Tools
What makes data structured or unstructured and how does that affect your logging efforts and information gain?
Integrating Threat Intelligence into Graylog 3+
How to use the Threat Intelligence plugin and integrate it into Graylog 3+.
3 Steps to Structuring Logs Effectively
Often, logs from different sources label data fields differently and/or provide data that’s completely unstructured. In order to analyze logs efficiently, they must be structured effectively.
Connecting Sidecar and Processing Pipelines Using Graylog
We would like to introduce a new series from our blog that takes you back to the basics of Graylog. Written by your Graylog engineers, these installments will be a deep dive into the main components of our platform.
Writing your own Graylog Processing Pipeline functions
In this post, we will go through creating your own processing pipeline function. Some Java experience will be helpful, but not necessary. We will be taking it step-by-step from understanding a pipeline, to implementing and installing your function.