The Graylog Blog
Graylog Illuminate: Getting Started with Sysmon
The Windows System Monitor (Sysmon) is one of the chattiest tools. With all the information coming in, it can be difficult and expensive to use it efficiently. However, the Graylog Illuminate package gives you a way to fine-tune it so that you can get better data and manage your ingestion rate better.
Can I Send an Alert to Discord?
The growth and use of Discord has transformed from just many Gaming users to businesses using it as a communication platform. Having the ability to send Log Management Alerts to Discord where everyone is collaborating can provide a major benefit to multiple teams in an organization.
This Week In Log Managment
This Week in Log Management - Are Dashboards and Reports related? What host can I use to send logs to Graylog?
Monitoring Logs for Insider Threats During Turbulent Times
In these turbulent times, IT teams leverage centralized log management solutions for making decisions. As the challenges change, the way you’re monitoring logs for insider threats needs to change, too.
How Are Dashboards and Reports Related?
Every week we get a lot of great questions through support, the community, social media, and on our weekly demo. On Friday, you can find here the most common questions and answers, tips, insights, a closer look at Graylog, interviews, etc.
VPN and Firewall Log Management
VPN and firewall log management can help detect and mitigate security risks for a hybrid workforce.
Red Team Tools Detection and Alerting
The Graylog alert feature can detect the signature from any log source in your organization with the signature/hash value in them. This blog post walks you through the bits of information from the YARA rules and create a rule in Graylog to alert when an IoC is detected.
Event Log Management for Security and Compliance
Every action in an organization’s network generates event data, including records produced by operating systems, applications, devices, and users. By following best practices for event log management, you can enhance your cybersecurity posture and enable a more robust compliance program.
Detecting Security Vulnerabilities with Alerts
Every day we discover new vulnerabilities in our systems, cracks in the fence the adversaries take advantage of to get into your organization and wreak havoc. Alerts from centralized log management can give advance notice of an attack or alert you when they are going on.
Importance of System Resource Monitoring on Graylog, Elasticsearch, and MongoDB Servers
The first thing we tell Graylog users is, “Monitor your disk space.” This is because it is critical that you know immediately if you are at risk of overloading the servers hosting Graylog, Elasticsearch, or MongoDB.
Parsing Log Files in Graylog - Overview
Want to know all about parsing log files? The experts here at Graylog prepared a useful guide for you.
Using Pipelines for Windows Log Processing
Use Graylog pipelines to enrich your logs and make them easier to read.
Log Indexing and Rotation for Optimized Archival in Graylog
How do I rotate around my logs and configure them in Graylog? Let's talk about the best practices around log retention and how to configure them in Graylog.
What to Do When You Have 1000+ Fields?
When you have 1000+ fields, Graylog can collect all the logs and have them ready for you to search through in one place.
Graylog Illuminate: The Story
Graylog Illuminate for Authentication creates a foundation to normalize all authentication data, regardless of source. This gives you consistency in reporting, alerting, and analysis plus the power to easily correlate authentication data.
Windows Filebeat Configuration and Graylog Sidecar
Graylog sidecar can create and manage a centralized configuration for a filebeat agent, to gather logs from a local server that is not part of the Windows Event Channel and across all your infrastructure hosts.
How to Set Up Graylog GeoIP Configuration
Having additional data on logs that contain IP addresses that gives you their Geolocation helps in your investigations and understanding of your traffic patterns. Here's a guide to set up Graylog and enrich your data with this info.
The Importance of Historical Log Data
Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.
Security Log Monitoring and DNS Request Analysis
By using strategically placed sensors, Graylog’s content pack collects DNS logs guarantees interoperability with any DNS request, even if it is going to an unexpected DNS server or if it was blocked somewhere further down the path.
How to use Graylog as a Syslog Server
A Syslog server is, by all basic terms, a centralized logging solution. While you might have more than one Syslog server, with Graylog you can accomplish all logging in one centralized spot.
Log Management and Graylog Alerts – Keeping Track of Events in Real-Time
Alerts are a critical component of every log management solution. Graylog alerts are incredibly accessible and they provide the information you need in real-time.
Key Value Parser Delivers Useful Information Fast
Graylog offers different parsers that you can use depending on your needs. One of those is the Key Value Parser. This parser allows you to parse the structured data into discrete fields so that you can search through it faster and more efficiently.
Getting Things Done With Graylog v3.2
Graylog Enterprise v3.2 is out in the world, customers are using it and loving it, and we want to share with you what we've learned from them.
Improving Kubernetes Clusters' Efficiency with Log Management
Log management plays an important role in helping to debug Kubernetes clusters, improve their efficiency, and monitor them for any suspicious activity.
Implementing Geolocation with Graylog Pipelines
You can further improve your ability to extract meaningful and useful geolocation data by leveraging the functionality of pipelines and lookup tables.
Log Formats – a (Mostly) Complete Guide
There are several standardized log formats that are most commonly generated by a wide assortment of different devices and systems. It is important to understand how they operate and differ from one another.
How to Use Graylog Lookup Tables
Graylog has a few built-in lookup tables and common adapters to read in the data from various locations. In this article, we'll go over the steps needed to configure your lookup table.
Ingesting Cloudtrail Logs with the Graylog AWS Plugin
In this blog post we'll set up the required AWS resources, configure the Graylog input, and do some basic searches to explore the capabilities of Cloudtrail logs.
Aggregating logs with Graylog – A quick how-to guide
Graylog’s log aggregation features are useful for a lot of tasks, ranging from regular troubleshooting to detecting issues as soon as they become manifest. Here's a quick guide.
Archiving Log Files: Feature Guide for File Storage and Archiving
Archiving Log Files: Feature Guide for File Storage and Archiving
Getting Started with Graylog - Community Post
The Graylog community is what makes the product so exciting. Here's how to start.
Integrating Threat Intelligence into Graylog 3+
How to use the Threat Intelligence plugin and integrate it into Graylog 3+.
Keeping Graylog Secure
After you are up and running on Graylog, there are a few different areas where you can limit the attack surface. This a plan which includes best practices. CIA Triad has published some industry best practices which is a good starting framework.
An Introduction to Graylog Aggregation Charts
Aggregation charts are a great way to visualize your data to find anomalous behavior in your organization. By summarizing your data into simple visual depictions, you can easily spot out anything that’s out of place.
How Graylog’s Advanced Functionalities Help You Make Sense of All Your Data
Graylog's advanced functionality and fully scalable model allow you to avoid picking only the most necessary and vital data to collect and analyze.
Large-Scale Log Management Deployment with Graylog: A User Perspective
See how a user in a large-scale cloud environment implemented Graylog to centralize log data from multiple data centers exceeding 1 TB/day.
Fishing for Log Events with Graylog Sidecar
The Graylog Sidecar lets you easily update collector configurations so you can always have the log data you need when your requirements change.
Trend Analysis with Graylog
Trend analysis provides rich information and yields insights into the operational and security health of your network that are otherwise difficult to discern. Learn how to use Graylog to perform the types of trend analysis discussed previously.
Managing Centralized Data with Graylog
For log management, it is more efficient to move the logs to a central place and process them there. See how Graylog serves as the sawmill and joiner for your logs to make log messages usable and give you valuable information for your environment.
Filebeat to Graylog: Working with Linux Audit Daemon Log File
If you run the audit daemon on your Linux distribution you might notice that some of the most valuable information produced by auditd is not transmitted when you enable syslog forwarding to Graylog.
Using a Hot/Warm Elasticsearch Cluster
Starting with Graylog v2.3, we've added support for Elasticsearch 5. As you may know, Elasticsearch 5 allows the use of the hot/warm cluster architecture. What is the hot/warm cluster architecture and why is it important to Graylog?
Coming soon: Elasticsearch 5 support
We know many of you have been asking for this and we are excited to say that it’s almost here: Elasticsearch 5 support is coming in Graylog v2.3!
Introducing Graylog Labs
We want to introduce you to [Graylog Labs] (https://github.com/graylog-labs), a new Github organization created by the core team at Graylog! Graylog Labs will be the home for all repositories that are not production ready for Graylog.
Monitoring Graylog - Host Metrics that you should Monitor Regularly
Once you have Graylog fully up and running, it’s best to implement a plan for monitoring your system to make sure everything is operating correctly. Graylog already provides various ways to access internal metrics, but we are often asked what to monitor.
Enhance Windows Security with Sysmon, Winlogbeat and Graylog
We’ll show you how to use the WinLogBeat to get the Windows Event Log over to your Graylog Installation.
Protecting Graylog from Data Ransom Attacks
There are currently ongoing data ransom attacks on misconfigured databases like MongoDB and Elasticsearch. Though not a true security hole, hackers simply search for instances that are not password protected and are accessible from the internet.
Investigating the RCE attack that knocked out 900,000 German routers on Sunday
900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?
Growing From Single Server to Graylog Cluster
In our second Back to Basics post, we'll walk through the process of scaling your environment from one Graylog server to a Graylog cluster.
Connecting Sidecar and Processing Pipelines Using Graylog
We would like to introduce a new series from our blog that takes you back to the basics of Graylog. Written by your Graylog engineers, these installments will be a deep dive into the main components of our platform.
Tapping Wires for Lean Security Monitoring: DNS Request Analysis with Open Source Software
The combined force of virus scanners, firewalls, IDS systems, and a log management system is a great way to protect your network. We would like to introduce an additional method of security monitoring.
Writing your own Graylog Processing Pipeline functions
In this post, we will go through creating your own processing pipeline function. Some Java experience will be helpful, but not necessary. We will be taking it step-by-step from understanding a pipeline, to implementing and installing your function.
Visualize and Correlate IDS Alerts with Open Source Tools
We will walk through integrating the IDS tool, Snort, with Graylog in order to detect and analyze suspicious activity. We will then provide examples of correlating IDS alerts with both network connection and operating system logs using Graylog.
A practical approach to Open Source network security monitoring
We will take a look at how you can analyze network traffic data in order to detect network intrusions. Every phase of intrusion will leave traces and with the correct tools in place, you can detect these early on and take countermeasures.
New Slack output feature: Short mode
The newest version of our popular Slack plugin comes with a new feature for the message output module: The short mode writes messages with as little overhead as possible. This is great for high frequency streams writing into Slack.
Troubleshoot Slow MongoDB Queries In Minutes With Graylog
Database application performance troubleshooting can be time consuming and frustrating. The good news is that many of these issues can be identified and resolved using the information stored in log data.
Slack Plug-in v2.0: Forward Stream Messages to Slack
We just released v2.0 of our popular Slack plugin. It has several changes, improvements and also a completely new message output module that allows you to forward messages that are routed into a stream to a Slack room in real-time.
Introducing Graylog Collector - The Comprehensive Log Collection Tool For Graylog
We started the Graylog project envisioning an end-to-end, purpose built log management solution. Over the last few years, we’ve been focused on fulfilling this mission of delivering the world’s best open source log management platform.
Centralized Docker Container Logging With Native Graylog Integration
Log collection from Docker containers has been difficult because containers do not persist for a long time, and don’t leave a reliable info history. As a result, tasks that rely on log data have become more difficult.
Tips & Tricks #1: How to Quickly Debug Your Stream Rules With One Click
In the first blog post of our new Tips & Tricks series, I want to show you a quick way to debug your stream rules to test whether your targeted messages will accurately be matched by a Graylog (http://docs.graylog.org/en/latest/pages/streams.html).
New OS package repositories for Debian 8 and CentOS 7
We now offer operating system packages tailored for Debian 8 and CentOS 7 including *systemd* support. Please see our updated documentation for details.