Houston, TX, USA
2013
  |  By Jeff Darrington
In Star Trek, the Borg are a cybernetic alien organism that forcibly assimilates other beings and technologies into its hivemind called “The Collective.” Each assimilated being or technology becomes part of the unified consciousness, with the villainous Borg Queen as the leaders. As the only independent thinker, the Borg Queen leads this rapidly adapting Collective.
  |  By Jeff Darrington
International travel comes with amazing sights, cultural experiences, and local delicacies. However, most travelers know that it comes with differing economies that impact a money’s value and various currencies. When people need cash, they have to translate the money in their wallets to the local currency, which means different coins and bills. Depending on the exchange rate, the currency’s value can change as the person moves from one country to another.
  |  By Jeff Darrington
Most people can remember the old game of telephone, the stream of whispered sentences or phrases across a group of kids. At each transmission, a different piece of information gets lost or misheard, leaving the last person with an incomplete or incomprehensible statement. Managing Docker logs can feel the same way, especially when an error message is lost or an error message lacks context.
  |  By The Graylog Team
If you have ever owned, operated, or supported a piece of technology, you have probably built a dashboard. Maybe it started as a quick chart to answer a simple question, then quietly grew into something more important. Dashboards are often created by the people who know the systems best, the ones who can wire together data sources and click all the right buttons. But those same builders are rarely trained in how humans actually interpret data.
  |  By Jeff Darrington
Mining for information about environments is like trying to find gold. Looking for gold can be sifting through silty waters or blasting through a mine. In some cases, the gold nuggets are so small as to be almost invisible, some things look like gold but aren’t, and others are larger nuggets where the miner strikes it rich. Trying to understand how a distributed system works means sifting through vast amounts of telemetry, looking for patterns.
  |  By Jeff Darrington
The Iron Man’s J.A.R.V.I.S. is the artificial intelligence (AI) that almost every person wants to see. A conversational technology that answers questions like a friend would. The rise of large language models (LLMs) almost seems to give people the friendly robotic sidekick that generations of children grew up dreaming about.
  |  By Jeff Darrington
Driving down the highway, you usually glance intermittently at your speedometer to ensure that you stay within the speed limit, or whatever window above the speed limit you’re willing to drive. While monitoring your speed mitigates the risk of a ticket, you still need to look out for various threats on the road, like cars going through stop signs. By observing your surroundings, you take in real-time information that can help prevent a crash.
  |  By Jeff Darrington
Atlassian audit logs carry high-value security and operational signals, yet the raw format makes them hard to use in day-to-day investigations. Nested JSON, arrays inside arrays, and localization keys turn routine questions into slow, manual work. For lean Security and IT teams, that friction shows up as delayed triage, fragile dashboards, and alerts that fire without enough context to act.
  |  By Jeff Darrington
You’re sitting at your desk, typing away, when all of a sudden you hear a “ping!” Unfortunately, you have a browser with fifteen tabs open, a task management application, email, messaging applications, and calendars all open, making it difficult to know exactly which technology just pinged you. To identify the source, you open your system settings and look at the notifications section to see which ones you allow to make a sound.
  |  By Jeff Darrington
Running Graylog on Kubernetes has been possible for a while, but let’s be honest: it usually involved a fair amount of DIY. Custom manifests, duct-taped values files, and more than one late-night kubectl describe pod. That changes today. We’re releasing the first-ever Graylog Helm chart for Kubernetes — now available in beta.
  |  By Graylog
From malformed fields to endlessly nested objects, JSON logs can feel like they’re trying to submit your SIEM. In this technical session, we’ll demonstrate how to turn that chokehold into a clean takedown using Graylog’s parsing, normalization, and enrichment capabilities. You’ll learn how to: Whether you’re a SOC analyst tired of regex wrestling or an admin looking to streamline onboarding, you’ll leave with practical techniques to make messy JSON your sparring partner—not your opponent.
  |  By Graylog
Atlassian’s audit records are data-rich, but messy. In this data-driven deep dive, Eddy Gurney from NetScout shares what it took to get them into Graylog. He walks through four pipeline approaches and why each fell short, then shows how moving parsing to the edge with Filebeat unlocked Graylog. With clean, flattened events flowing in, alerts and dashboards turn “noise” into operational visibility. You’ll also see how Sidecars makes config rollout easy, plus what changes to make if you’re on Atlassian Cloud instead of Data Center.
  |  By Graylog
Have a sneak peek at Graylog V7.0. Graylog V7.0 introduces a major step forward in speed, usability, and visibility across your entire security and operations workflow. In this demo, we walk through the newest capabilities designed to help teams detect, investigate, and respond faster than ever. You’ll see how the updated interface streamlines daily tasks, how the enhanced search and pipeline tools simplify complex data handling, and how powerful additions like built-in correlation and modernized dashboards give you clearer insight with less effort.
  |  By Graylog
Graylog V7.0 supports integration with the Model Context Protocol (MCP), which allows large language models (LLMs) to access and interact with Graylog data and workflows in real time. Graylog exposes an MCP-compatible endpoint for LLM clients, such as Claude and LM Studio. MCP integration allows Graylog users to interact with their data through LLMs. With MCP, an LLM can connect directly to Graylog as a remote tool interface, performing queries, retrieving system information, and assisting with common administrative or investigative tasks. This capability may make it possible to.
  |  By Graylog
Check out the new exciting features added to Graylog V7.0 Seth Goldhammer VP of Product and Ed Metcalf VP of Product Marketing walk you through the new features!
  |  By Graylog
Ethan Keaton takes you through upgrading A Graylog cluster to V7.0.
  |  By Graylog
How much value are you really getting from your logs, and what are you giving up to stay on budget? In this episode of Logs and Lattes, host Palmer Wallace sits down with Seth Goldhammer, VP of Product Management at Graylog, for a candid conversation about the hidden cost of traditional SIEM pricing. Seth explains how ingest-based and resource-heavy licensing models pressure security teams into tough tradeoffs, such as dropping logs, tuning down detections, or limiting retention just to avoid budget overages.
  |  By Graylog
Follow Rich Murphy Director of Product Management for Security walking you through Data Lake Preview and Retrieval.
  |  By Graylog
SIEM & Log Management — Without Compromise: Watch an exclusive dive into Graylog 6.2 Spring ’25 Release, purpose-built to eliminate the trade-offs traditional Log Management and SIEMs force on your IT, Security, DevOps and Compliance teams. You get smarter data retention, plus easier detection and investigations.
  |  By Graylog
Check out the latest tour of Graylog Enterprise. Check out Graylog Data Lake, Content Hub, Alerting, Role-Based Access Control, and more!
  |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
  |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
  |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
  |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
  |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.