The Graylog Blog
Red Team Tools Detection and Alerting
The Graylog alert feature can detect the signature from any log source in your organization with the signature/hash value in them. This blog post walks you through the bits of information from the YARA rules and create a rule in Graylog to alert when an IoC is detected.
Event Log Management for Security and Compliance
Every action in an organization’s network generates event data, including records produced by operating systems, applications, devices, and users. By following best practices for event log management, you can enhance your cybersecurity posture and enable a more robust compliance program.
Detecting Security Vulnerabilities with Alerts
Every day we discover new vulnerabilities in our systems, cracks in the fence the adversaries take advantage of to get into your organization and wreak havoc. Alerts from centralized log management can give advance notice of an attack or alert you when they are going on.
The Importance of Log Management and Cybersecurity
Struggling with the evolving cybersecurity threat landscape often means feeling one step behind cybercriminals. Interconnected cloud ecosystems expand your digital footprint and this increases the attack surface. More users, data, and devices connected to your networks mean more monitoring for cyber attacks. Detecting suspicious activity before or during the forensic investigation is how centralized log management supports cybersecurity.
Importance of System Resource Monitoring on Graylog, Elasticsearch, and MongoDB Servers
The first thing we tell Graylog users is, “Monitor your disk space.” This is because it is critical that you know immediately if you are at risk of overloading the servers hosting Graylog, Elasticsearch, or MongoDB.
Parsing Log Files in Graylog - Overview
Want to know all about parsing log files? The experts here at Graylog prepared a useful guide for you.
Using Pipelines for Windows Log Processing
Use Graylog pipelines to enrich your logs and make them easier to read.
Log Indexing and Rotation for Optimized Archival in Graylog
How do I rotate around my logs and configure them in Graylog? Let's talk about the best practices around log retention and how to configure them in Graylog.
What to Do When You Have 1000+ Fields?
When you have 1000+ fields, Graylog can collect all the logs and have them ready for you to search through in one place.
Graylog Illuminate: The Story
Graylog Illuminate for Authentication creates a foundation to normalize all authentication data, regardless of source. This gives you consistency in reporting, alerting, and analysis plus the power to easily correlate authentication data.
Windows Filebeat Configuration and Graylog Sidecar
Graylog sidecar can create and manage a centralized configuration for a filebeat agent, to gather logs from a local server that is not part of the Windows Event Channel and across all your infrastructure hosts.
How to Set Up Graylog GeoIP Configuration
Having additional data on logs that contain IP addresses that gives you their Geolocation helps in your investigations and understanding of your traffic patterns. Here's a guide to set up Graylog and enrich your data with this info.
The Importance of Historical Log Data
Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.
Security Log Monitoring and DNS Request Analysis
By using strategically placed sensors, Graylog’s content pack collects DNS logs guarantees interoperability with any DNS request, even if it is going to an unexpected DNS server or if it was blocked somewhere further down the path.
How to use Graylog as a Syslog Server
A Syslog server is, by all basic terms, a centralized logging solution. While you might have more than one Syslog server, with Graylog you can accomplish all logging in one centralized spot.
Log Management and Graylog Alerts – Keeping Track of Events in Real-Time
Alerts are a critical component of every log management solution. Graylog alerts are incredibly accessible and they provide the information you need in real-time.
Key Value Parser Delivers Useful Information Fast
Graylog offers different parsers that you can use depending on your needs. One of those is the Key Value Parser. This parser allows you to parse the structured data into discrete fields so that you can search through it faster and more efficiently.
Getting Things Done With Graylog v3.2
Graylog Enterprise v3.2 is out in the world, customers are using it and loving it, and we want to share with you what we've learned from them.
Improving Kubernetes Clusters' Efficiency with Log Management
Log management plays an important role in helping to debug Kubernetes clusters, improve their efficiency, and monitor them for any suspicious activity.
Implementing Geolocation with Graylog Pipelines
You can further improve your ability to extract meaningful and useful geolocation data by leveraging the functionality of pipelines and lookup tables.
Log Formats – a (Mostly) Complete Guide
There are several standardized log formats that are most commonly generated by a wide assortment of different devices and systems. It is important to understand how they operate and differ from one another.
How to Use Graylog Lookup Tables
Graylog has a few built-in lookup tables and common adapters to read in the data from various locations. In this article, we'll go over the steps needed to configure your lookup table.
Ingesting Cloudtrail Logs with the Graylog AWS Plugin
In this blog post we'll set up the required AWS resources, configure the Graylog input, and do some basic searches to explore the capabilities of Cloudtrail logs.
Shipping Office 365 audit logs to Graylog with O365beat
O365beat is an exceptionally useful open-source log shipping tool created by counteractive. With a few simple tweaks, it can be used to fetch Office 365 audit logs from the Office 365 Management Activity API and forward them to Graylog.
Aggregating logs with Graylog – A quick how-to guide
Graylog’s log aggregation features are useful for a lot of tasks, ranging from regular troubleshooting to detecting issues as soon as they become manifest. Here's a quick guide.
Archiving Log Files: Feature Guide for File Storage and Archiving
Archiving Log Files: Feature Guide for File Storage and Archiving
Getting Started with Graylog - Community Post
The Graylog community is what makes the product so exciting. Here's how to start.
Integrating Threat Intelligence into Graylog 3+
How to use the Threat Intelligence plugin and integrate it into Graylog 3+.
Keeping Graylog Secure
After you are up and running on Graylog, there are a few different areas where you can limit the attack surface. This a plan which includes best practices. CIA Triad has published some industry best practices which is a good starting framework.
An Introduction to Graylog Aggregation Charts
Aggregation charts are a great way to visualize your data to find anomalous behavior in your organization. By summarizing your data into simple visual depictions, you can easily spot out anything that’s out of place.
How Graylog’s Advanced Functionalities Help You Make Sense of All Your Data
Graylog's advanced functionality and fully scalable model allow you to avoid picking only the most necessary and vital data to collect and analyze.
Large-Scale Log Management Deployment with Graylog: A User Perspective
See how a user in a large-scale cloud environment implemented Graylog to centralize log data from multiple data centers exceeding 1 TB/day.
Fishing for Log Events with Graylog Sidecar
The Graylog Sidecar lets you easily update collector configurations so you can always have the log data you need when your requirements change.
Trend Analysis with Graylog
Trend analysis provides rich information and yields insights into the operational and security health of your network that are otherwise difficult to discern. Learn how to use Graylog to perform the types of trend analysis discussed previously.
Managing Centralized Data with Graylog
For log management, it is more efficient to move the logs to a central place and process them there. See how Graylog serves as the sawmill and joiner for your logs to make log messages usable and give you valuable information for your environment.
A Beginner’s Guide to Integrating Threat Intelligence
In this post, I highlight the basics of what to consider when selecting a source of threat intelligence and provide an outline of what steps are needed to integrate that data.
Filebeat to Graylog: Working with Linux Audit Daemon Log File
If you run the audit daemon on your Linux distribution you might notice that some of the most valuable information produced by auditd is not transmitted when you enable syslog forwarding to Graylog.
Using a Hot/Warm Elasticsearch Cluster
Starting with Graylog v2.3, we've added support for Elasticsearch 5. As you may know, Elasticsearch 5 allows the use of the hot/warm cluster architecture. What is the hot/warm cluster architecture and why is it important to Graylog?
Coming soon: Elasticsearch 5 support
We know many of you have been asking for this and we are excited to say that it’s almost here: Elasticsearch 5 support is coming in Graylog v2.3!
Introducing Graylog Labs
We want to introduce you to [Graylog Labs] (https://github.com/graylog-labs), a new Github organization created by the core team at Graylog! Graylog Labs will be the home for all repositories that are not production ready for Graylog.
Monitoring Graylog - Host Metrics that you should Monitor Regularly
Once you have Graylog fully up and running, it’s best to implement a plan for monitoring your system to make sure everything is operating correctly. Graylog already provides various ways to access internal metrics, but we are often asked what to monitor.
Enhance Windows Security with Sysmon, Winlogbeat and Graylog
We’ll show you how to use the WinLogBeat to get the Windows Event Log over to your Graylog Installation.
Protecting Graylog from Data Ransom Attacks
There are currently ongoing data ransom attacks on misconfigured databases like MongoDB and Elasticsearch. Though not a true security hole, hackers simply search for instances that are not password protected and are accessible from the internet.
Investigating the RCE attack that knocked out 900,000 German routers on Sunday
900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?
Growing From Single Server to Graylog Cluster
In our second Back to Basics post, we'll walk through the process of scaling your environment from one Graylog server to a Graylog cluster.
Connecting Sidecar and Processing Pipelines Using Graylog
We would like to introduce a new series from our blog that takes you back to the basics of Graylog. Written by your Graylog engineers, these installments will be a deep dive into the main components of our platform.
Tapping Wires for Lean Security Monitoring: DNS Request Analysis with Open Source Software
The combined force of virus scanners, firewalls, IDS systems, and a log management system is a great way to protect your network. We would like to introduce an additional method of security monitoring.
Writing your own Graylog Processing Pipeline functions
In this post, we will go through creating your own processing pipeline function. Some Java experience will be helpful, but not necessary. We will be taking it step-by-step from understanding a pipeline, to implementing and installing your function.
Visualize and Correlate IDS Alerts with Open Source Tools
We will walk through integrating the IDS tool, Snort, with Graylog in order to detect and analyze suspicious activity. We will then provide examples of correlating IDS alerts with both network connection and operating system logs using Graylog.
A practical approach to Open Source network security monitoring
We will take a look at how you can analyze network traffic data in order to detect network intrusions. Every phase of intrusion will leave traces and with the correct tools in place, you can detect these early on and take countermeasures.
New Slack output feature: Short mode
The newest version of our popular Slack plugin comes with a new feature for the message output module: The short mode writes messages with as little overhead as possible. This is great for high frequency streams writing into Slack.
Troubleshoot Slow MongoDB Queries In Minutes With Graylog
Database application performance troubleshooting can be time consuming and frustrating. The good news is that many of these issues can be identified and resolved using the information stored in log data.
Slack Plug-in v2.0: Forward Stream Messages to Slack
We just released v2.0 of our popular Slack plugin. It has several changes, improvements and also a completely new message output module that allows you to forward messages that are routed into a stream to a Slack room in real-time.
SNMP & NetFlow Plug-ins Extend Graylog Network Infrastructure Support
We heard loud and clear from the community the need to provide better visibility into the health of their infrastructure and networks. With SNMP and NetFlow support, we can now provide better visibility into your network and compute infrastructure.
Introducing Graylog Collector - The Comprehensive Log Collection Tool For Graylog
We started the Graylog project envisioning an end-to-end, purpose built log management solution. Over the last few years, we’ve been focused on fulfilling this mission of delivering the world’s best open source log management platform.
Centralized Docker Container Logging With Native Graylog Integration
Log collection from Docker containers has been difficult because containers do not persist for a long time, and don’t leave a reliable info history. As a result, tasks that rely on log data have become more difficult.
Tips & Tricks #2: Using the Graylog REST API
Did you know that Graylog comes with its own REST API and interactive API browser? The Graylog REST API is purpose-built for log management, and will enable you to easily integrate Graylog with other systems or your own customized scripts.
Tips & Tricks #1: How to Quickly Debug Your Stream Rules With One Click
In the first blog post of our new Tips & Tricks series, I want to show you a quick way to debug your stream rules to test whether your targeted messages will accurately be matched by a Graylog (http://docs.graylog.org/en/latest/pages/streams.html).
New OS package repositories for Debian 8 and CentOS 7
We now offer operating system packages tailored for Debian 8 and CentOS 7 including *systemd* support. Please see our updated documentation for details.