Graylog

Houston, TX, USA
2013
  |  By Jeff Darrington
When you get behind the wheel of your car, one of the first things you see is the dashboard. Your dashboard provides various information about all the different technologies that make the car run smoothly, like helping you control your speed, providing insight into your fuel levels, and offering suggestions for regular maintenance, like oil changes. For developers, Kubernetes acts as that one-glance dashboard to provide insights about container performance, maintenance needs, and storage requirements.
  |  By Jeff Darrington
Syslog was developed in the 1980s by Eric Allman as part of the Sendmail project and adopted by many systems over the years. When looking at Syslog, there are a few protocol options, each with slight differences. In this reference guide, I’ll break down the differences so that you have a guide to see these formats when utilizing this protocol.
  |  By Jeff Darrington
Imagine sitting in an airport’s international terminal. All around you, people are talking to friends and family, many using different languages. The din of noise becomes a constant thrum, and you can’t make sense of anything – not even conversations in your native language. Log data is similar to this scenario. Every technology in your environment generates log data, and information about the activities happening from logins to processing.
  |  By The Graylog Team
With so many choices available to us today, choosing log management software that’s just right for us has never been simpler. That is, if you know exactly what it is you are looking for. But for many users, the sheer amount of computer programs that perform the same tasks, and seem so similar(sometimes almost identical) to each other, can quickly become off-putting and confusing.
  |  By Jeff Darrington
The financial services industry has been a threat actor target since before digital transformation was even a term. Further, the financial services organizations find themselves continuously under scrutiny. As members of a highly regulated industry, these companies need to comply with various laws to ensure that they effectively protect sensitive data.
  |  By Jeff Darrington
Developing an application is like composing a song. You know your intended outcome, and the creation is what gives you the jolt of adrenaline to keep going. However, your job isn’t over once you push the application live. You need to monitor and maintain it to ensure performance and cost optimization. AWS Lambda forwards metrics to CloudWatch once the function completes processing an event. Through the CloudWatch console, you can set alarms and build visualizations with these metrics.
  |  By Jeff Darrington
To upgrade, or not to upgrade. While that may not have been the question that Hamlet asked, it’s one you might be asking. You already made the mistake of asking Reddit, “should I do an in-place upgrade,” and, as expected, people had Big Opinions. A Windows Server Feature Update offers benefits, like performance and analytics. On the other hand, if you have problems, then your attempts can lead to business downtime and service disruption.
  |  By Jeff Darrington
Serverless architectures are the rental tux of computing. If you’re using AWS to manage and scale your underlying infrastructure, you’re renting compute time or storage space. Your Lambda functions are the tie or cummerbund you purchase to customize your rental. Using the AWS event-driven architecture improves business agility, allowing you to move quickly. Lambda is the on-demand compute services that runs custom code driving an event’s response.
  |  By Jeff Darrington
Linux, Debian, and Ubuntu are the Kirk, Spock, and McCoy of modern application development. The Captain Kirk, Linux, is the open-source central code for directing and talking to hardware. Debian sits as the trio’s Spock, the original distro that can be seen as more complex to install and use. As a Debian child distro, Ubuntu is the McCoy, helping to heal the challenges that people have when trying to use Debian.
  |  By Jeff Darrington
Internet of Things (IoT) devices are everywhere you look. From the smartwatch on your wrist to the security cameras protecting your offices, connected IoT devices transmit all kinds of data. However, these compact devices are different from the other technologies your organization uses. Unlike traditional devices, IoT devices lack a standardized set of security capabilities, making them easier for attackers to exploit.
  |  By Graylog
Are you experiencing performance issues with your Graylog instance? Are late-night alerts and unexplained slowdowns keeping you up at night? You're not alone if you’re dealing with license limit violations without a clear cause. In this session, we’ll share our experiences with these common Graylog challenges and the practical solutions we’ve developed to overcome them.
  |  By Graylog
So you’ve gone ahead and ingested every log you can think of and built a plethora of detections in line with frameworks and best practices. You may have even dabbled into custom alerts built from your own internal assessments and findings. Or maybe it’s the opposite; you’re still early in your journey toward security maturity or logging new or custom applications without much guidance. It can be hard to feel truly comfortable with your environment’s security in both situations. Standards are good but can be too noisy and restrictive in some places and too quiet or permissive in others.
  |  By Graylog
In this talk, we’ll explore the cutting-edge work InfusionPoints has done to process and enrich alerts from Graylog using Amazon Bedrock and advanced Large Language Models (LLMs) from Amazon Titan and Anthropic. Discover how we’ve harnessed the power of AI to elevate the accuracy, relevance, and actionable insights of our security alerts, transforming how we respond to potential threats.
  |  By Graylog
The session is really about customers spending their resources wisely, prioritizing use case development based on blind spots, weaknesses, or maybe even just plain audit findings. We have all been guilty in the past of spending a lot of time building clever use cases just for them to never fire or not work out the way we’d hoped; this talk is aimed at highlighting this issue and teach users to focus their resources and build a strategy for development like any other process they would internally.
  |  By Graylog
Join an engaging panel discussion featuring Graylog customers as they share their experiences and lessons learned on their journey with Graylog. Moderated by Mark Brooks, Graylog's Customer Success Officer, the panel will explore diverse use cases, the process of evaluating SIEM solutions, managing complex environments, and the unique advantages of leveraging open-source technology. Gain valuable insights from real-world implementations and discover how these organizations optimized their security operations using Graylog.
  |  By Graylog
Take a fast easy way to get Graylog installed using Docker to try it out!
  |  By Graylog
Take this upbeat journey installing Graylog V6.1 on Rocky Linux.
  |  By Graylog
Follow Carla Garcia Content Development Engineer at Graylog as she walks you through: Capture your Windows Logs!!
  |  By Graylog
Explore the new feature Data Routing in Graylog. This new feature allows you to route your data into Data Tiers for lower cost storage. Storing logs into Data Warehouse where ingestion does not count towards your licensing costs. Bring in those logs when required in an investigation or some other purpose.
  |  By Graylog
Step through a quick tour of the features and functionality in Graylog.
  |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
  |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
  |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
  |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
  |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.