The Graylog Blog
Using Pipelines for Windows Log Processing
Use Graylog pipelines to enrich your logs and make them easier to read.
Log Indexing and Rotation for Optimized Archival in Graylog
How do I rotate around my logs and configure them in Graylog? Let's talk about the best practices around log retention and how to configure them in Graylog.
Windows Filebeat Configuration and Graylog Sidecar
Graylog sidecar can create and manage a centralized configuration for a filebeat agent, to gather logs from a local server that is not part of the Windows Event Channel and across all your infrastructure hosts.
Making data-driven decisions with log management software
Data-driven decisions certainly are more reliable than those based upon mere instinct, and logs are a fantastic source of information to fuel a company's business intelligence strategies.
Turning Unstructured Data Into Structured Data With Log Management Tools
What makes data structured or unstructured and how does that affect your logging efforts and information gain?
Integrating Threat Intelligence into Graylog 3+
How to use the Threat Intelligence plugin and integrate it into Graylog 3+.
3 Steps to Structuring Logs Effectively
Often, logs from different sources label data fields differently and/or provide data that’s completely unstructured. In order to analyze logs efficiently, they must be structured effectively.
A Beginner’s Guide to Integrating Threat Intelligence
In this post, I highlight the basics of what to consider when selecting a source of threat intelligence and provide an outline of what steps are needed to integrate that data.