The Graylog Blog

Tech Series

Red Team Tools Detection and Alerting

December 16, 2020

The Graylog alert feature can detect the signature from any log source in your organization with the signature/hash value in them. This blog post walks you through the bits of information from the YARA rules and create a rule in Graylog to alert when an IoC is detected. 

Event Log Management for Security and Compliance

October 15, 2020

Every action in an organization’s network generates event data, including records produced by operating systems, applications, devices, and users. By following best practices for event log management, you can enhance your cybersecurity posture and enable a more robust compliance program.

Detecting Security Vulnerabilities with Alerts

October 8, 2020

Every day we discover new vulnerabilities in our systems, cracks in the fence the adversaries take advantage of to get into your organization and wreak havoc. Alerts from centralized log management can give advance notice of an attack or alert you when they are going on.

The Importance of Log Management and Cybersecurity

October 1, 2020

Struggling with the evolving cybersecurity threat landscape often means feeling one step behind cybercriminals. Interconnected cloud ecosystems expand your digital footprint and this increases the attack surface. More users, data, and devices connected to your networks mean more monitoring for cyber attacks. Detecting suspicious activity before or during the forensic investigation is how centralized log management supports cybersecurity.

Importance of System Resource Monitoring on Graylog, Elasticsearch, and MongoDB Servers

July 2, 2020

The first thing we tell Graylog users is, “Monitor your disk space.” This is because it is critical that you know immediately if you are at risk of overloading the servers hosting Graylog, Elasticsearch, or MongoDB.

Parsing Log Files in Graylog - Overview

June 23, 2020

Want to know all about parsing log files? The experts here at Graylog prepared a useful guide for you.

Using Pipelines for Windows Log Processing

June 23, 2020

Use Graylog pipelines to enrich your logs and make them easier to read.

Log Indexing and Rotation for Optimized Archival in Graylog

June 16, 2020

How do I rotate around my logs and configure them in Graylog? Let's talk about the best practices around log retention and how to configure them in Graylog.

What to Do When You Have 1000+ Fields?

June 16, 2020

When you have 1000+ fields, Graylog can collect all the logs and have them ready for you to search through in one place.

Graylog Illuminate: The Story

June 8, 2020

Graylog Illuminate for Authentication creates a foundation to normalize all authentication data, regardless of source. This gives you consistency in reporting, alerting, and analysis plus the power to easily correlate authentication data.

Windows Filebeat Configuration and Graylog Sidecar

June 5, 2020

Graylog sidecar can create and manage a centralized configuration for a filebeat agent, to gather logs from a local server that is not part of the Windows Event Channel and across all your infrastructure hosts.

How to Set Up Graylog GeoIP Configuration

May 27, 2020

Having additional data on logs that contain IP addresses that gives you their Geolocation helps in your investigations and understanding of your traffic patterns. Here's a guide to set up Graylog and enrich your data with this info.

The Importance of Historical Log Data

May 21, 2020

Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.

Security Log Monitoring and DNS Request Analysis

May 8, 2020

By using strategically placed sensors, Graylog’s content pack collects DNS logs guarantees interoperability with any DNS request, even if it is going to an unexpected DNS server or if it was blocked somewhere further down the path.

How to use Graylog as a Syslog Server

May 5, 2020

A Syslog server is, by all basic terms, a centralized logging solution. While you might have more than one Syslog server, with Graylog you can accomplish all logging in one centralized spot.

Log Management and Graylog Alerts – Keeping Track of Events in Real-Time

April 28, 2020

Alerts are a critical component of every log management solution. Graylog alerts are incredibly accessible and they provide the information you need in real-time.

Key Value Parser Delivers Useful Information Fast

April 9, 2020

Graylog offers different parsers that you can use depending on your needs. One of those is the Key Value Parser. This parser allows you to parse the structured data into discrete fields so that you can search through it faster and more efficiently.

Getting Things Done With Graylog v3.2

March 26, 2020

Graylog Enterprise v3.2 is out in the world, customers are using it and loving it, and we want to share with you what we've learned from them.

Improving Kubernetes Clusters' Efficiency with Log Management

February 20, 2020

Log management plays an important role in helping to debug Kubernetes clusters, improve their efficiency, and monitor them for any suspicious activity.

Implementing Geolocation with Graylog Pipelines

January 22, 2020

You can further improve your ability to extract meaningful and useful geolocation data by leveraging the functionality of pipelines and lookup tables.

Log Formats – a (Mostly) Complete Guide

January 15, 2020

There are several standardized log formats that are most commonly generated by a wide assortment of different devices and systems. It is important to understand how they operate and differ from one another.

How to Use Graylog Lookup Tables

December 20, 2019

Graylog has a few built-in lookup tables and common adapters to read in the data from various locations. In this article, we'll go over the steps needed to configure your lookup table.

Ingesting Cloudtrail Logs with the Graylog AWS Plugin

December 10, 2019

In this blog post we'll set up the required AWS resources, configure the Graylog input, and do some basic searches to explore the capabilities of Cloudtrail logs.

Shipping Office 365 audit logs to Graylog with O365beat

November 22, 2019

O365beat is an exceptionally useful open-source log shipping tool created by counteractive. With a few simple tweaks, it can be used to fetch Office 365 audit logs from the Office 365 Management Activity API and forward them to Graylog.

Aggregating logs with Graylog – A quick how-to guide

October 15, 2019

Graylog’s log aggregation features are useful for a lot of tasks, ranging from regular troubleshooting to detecting issues as soon as they become manifest. Here's a quick guide.

Archiving Log Files: Feature Guide for File Storage and Archiving

September 5, 2019

Archiving Log Files: Feature Guide for File Storage and Archiving

Getting Started with Graylog - Community Post

June 27, 2019

The Graylog community is what makes the product so exciting. Here's how to start.

Integrating Threat Intelligence into Graylog 3+

June 25, 2019

How to use the Threat Intelligence plugin and integrate it into Graylog 3+.

Keeping Graylog Secure

June 15, 2019

After you are up and running on Graylog, there are a few different areas where you can limit the attack surface. This a plan which includes best practices. CIA Triad has published some industry best practices which is a good starting framework.

An Introduction to Graylog Aggregation Charts

February 21, 2019

Aggregation charts are a great way to visualize your data to find anomalous behavior in your organization. By summarizing your data into simple visual depictions, you can easily spot out anything that’s out of place.

How Graylog’s Advanced Functionalities Help You Make Sense of All Your Data

January 9, 2019

Graylog's advanced functionality and fully scalable model allow you to avoid picking only the most necessary and vital data to collect and analyze.

Large-Scale Log Management Deployment with Graylog: A User Perspective

July 9, 2018

See how a user in a large-scale cloud environment implemented Graylog to centralize log data from multiple data centers exceeding 1 TB/day.

Fishing for Log Events with Graylog Sidecar

June 21, 2018

The Graylog Sidecar lets you easily update collector configurations so you can always have the log data you need when your requirements change.

Trend Analysis with Graylog

June 15, 2018

Trend analysis provides rich information and yields insights into the operational and security health of your network that are otherwise difficult to discern. Learn how to use Graylog to perform the types of trend analysis discussed previously.

Managing Centralized Data with Graylog

May 30, 2018

For log management, it is more efficient to move the logs to a central place and process them there. See how Graylog serves as the sawmill and joiner for your logs to make log messages usable and give you valuable information for your environment.

Integrating Threat Intelligence with Graylog

May 1, 2018

A Beginner’s Guide to Integrating Threat Intelligence

April 18, 2018

In this post, I highlight the basics of what to consider when selecting a source of threat intelligence and provide an outline of what steps are needed to integrate that data.

Filebeat to Graylog: Working with Linux Audit Daemon Log File

February 5, 2018

If you run the audit daemon on your Linux distribution you might notice that some of the most valuable information produced by auditd is not transmitted when you enable syslog forwarding to Graylog.

Using a Hot/Warm Elasticsearch Cluster

August 3, 2017

Starting with Graylog v2.3, we've added support for Elasticsearch 5. As you may know, Elasticsearch 5 allows the use of the hot/warm cluster architecture. What is the hot/warm cluster architecture and why is it important to Graylog?

Coming soon: Elasticsearch 5 support

April 6, 2017

We know many of you have been asking for this and we are excited to say that it’s almost here: Elasticsearch 5 support is coming in Graylog v2.3!

Introducing Graylog Labs

March 31, 2017

We want to introduce you to [Graylog Labs] (, a new Github organization created by the core team at Graylog! Graylog Labs will be the home for all repositories that are not production ready for Graylog.

Monitoring Graylog - Host Metrics that you should Monitor Regularly

February 9, 2017

Once you have Graylog fully up and running, it’s best to implement a plan for monitoring your system to make sure everything is operating correctly. Graylog already provides various ways to access internal metrics, but we are often asked what to monitor.

Enhance Windows Security with Sysmon, Winlogbeat and Graylog

January 26, 2017

We’ll show you how to use the WinLogBeat to get the Windows Event Log over to your Graylog Installation.

Protecting Graylog from Data Ransom Attacks

January 23, 2017

There are currently ongoing data ransom attacks on misconfigured databases like MongoDB and Elasticsearch. Though not a true security hole, hackers simply search for instances that are not password protected and are accessible from the internet.

Investigating the RCE attack that knocked out 900,000 German routers on Sunday

November 28, 2016

900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?

Growing From Single Server to Graylog Cluster

November 1, 2016

In our second Back to Basics post, we'll walk through the process of scaling your environment from one Graylog server to a Graylog cluster.

Connecting Sidecar and Processing Pipelines Using Graylog

October 13, 2016

We would like to introduce a new series from our blog that takes you back to the basics of Graylog. Written by your Graylog engineers, these installments will be a deep dive into the main components of our platform.

Tapping Wires for Lean Security Monitoring: DNS Request Analysis with Open Source Software

October 10, 2016

The combined force of virus scanners, firewalls, IDS systems, and a log management system is a great way to protect your network. We would like to introduce an additional method of security monitoring.

Writing your own Graylog Processing Pipeline functions

September 20, 2016

In this post, we will go through creating your own processing pipeline function. Some Java experience will be helpful, but not necessary. We will be taking it step-by-step from understanding a pipeline, to implementing and installing your function.

Visualize and Correlate IDS Alerts with Open Source Tools

August 10, 2016

We will walk through integrating the IDS tool, Snort, with Graylog in order to detect and analyze suspicious activity. We will then provide examples of correlating IDS alerts with both network connection and operating system logs using Graylog.

A practical approach to Open Source network security monitoring

August 1, 2016

We will take a look at how you can analyze network traffic data in order to detect network intrusions. Every phase of intrusion will leave traces and with the correct tools in place, you can detect these early on and take countermeasures.

New Slack output feature: Short mode

February 22, 2016

The newest version of our popular Slack plugin comes with a new feature for the message output module: The short mode writes messages with as little overhead as possible. This is great for high frequency streams writing into Slack.

Troubleshoot Slow MongoDB Queries In Minutes With Graylog

November 12, 2015

Database application performance troubleshooting can be time consuming and frustrating. The good news is that many of these issues can be identified and resolved using the information stored in log data.

Slack Plug-in v2.0: Forward Stream Messages to Slack

November 11, 2015

We just released v2.0 of our popular Slack plugin. It has several changes, improvements and also a completely new message output module that allows you to forward messages that are routed into a stream to a Slack room in real-time.

SNMP & NetFlow Plug-ins Extend Graylog Network Infrastructure Support

October 22, 2015

We heard loud and clear from the community the need to provide better visibility into the health of their infrastructure and networks. With SNMP and NetFlow support, we can now provide better visibility into your network and compute infrastructure.

Introducing Graylog Collector - The Comprehensive Log Collection Tool For Graylog

August 19, 2015

We started the Graylog project envisioning an end-to-end, purpose built log management solution. Over the last few years, we’ve been focused on fulfilling this mission of delivering the world’s best open source log management platform.

Centralized Docker Container Logging With Native Graylog Integration

August 3, 2015

Log collection from Docker containers has been difficult because containers do not persist for a long time, and don’t leave a reliable info history. As a result, tasks that rely on log data have become more difficult.

Tips & Tricks #2: Using the Graylog REST API

July 29, 2015

Did you know that Graylog comes with its own REST API and interactive API browser? The Graylog REST API is purpose-built for log management, and will enable you to easily integrate Graylog with other systems or your own customized scripts.

Tips & Tricks #1: How to Quickly Debug Your Stream Rules With One Click

July 21, 2015

In the first blog post of our new Tips & Tricks series, I want to show you a quick way to debug your stream rules to test whether your targeted messages will accurately be matched by a Graylog (

New OS package repositories for Debian 8 and CentOS 7

July 16, 2015

We now offer operating system packages tailored for Debian 8 and CentOS 7 including *systemd* support. Please see our updated documentation for details.

Ready to get started?

Get Graylog