Graylog

Houston, TX, USA
2013
  |  By Jeff Darrington
To upgrade, or not to upgrade. While that may not have been the question that Hamlet asked, it’s one you might be asking. You already made the mistake of asking Reddit, “should I do an in-place upgrade,” and, as expected, people had Big Opinions. A Windows Server Feature Update offers benefits, like performance and analytics. On the other hand, if you have problems, then your attempts can lead to business downtime and service disruption.
  |  By Jeff Darrington
Serverless architectures are the rental tux of computing. If you’re using AWS to manage and scale your underlying infrastructure, you’re renting compute time or storage space. Your Lambda functions are the tie or cummerbund you purchase to customize your rental. Using the AWS event-driven architecture improves business agility, allowing you to move quickly. Lambda is the on-demand compute services that runs custom code driving an event’s response.
  |  By Jeff Darrington
Linux, Debian, and Ubuntu are the Kirk, Spock, and McCoy of modern application development. The Captain Kirk, Linux, is the open-source central code for directing and talking to hardware. Debian sits as the trio’s Spock, the original distro that can be seen as more complex to install and use. As a Debian child distro, Ubuntu is the McCoy, helping to heal the challenges that people have when trying to use Debian.
  |  By Jeff Darrington
Internet of Things (IoT) devices are everywhere you look. From the smartwatch on your wrist to the security cameras protecting your offices, connected IoT devices transmit all kinds of data. However, these compact devices are different from the other technologies your organization uses. Unlike traditional devices, IoT devices lack a standardized set of security capabilities, making them easier for attackers to exploit.
  |  By The Graylog Product Team
Migrating your data infrastructure can sound daunting, especially when you’re dealing with complex systems like OpenSearch. But what if it could be easier—almost ridiculously easy? If you’re thinking, “Hey, wait a second—could this be as seamless as it sounds?” You’re in for a pleasant surprise. In this blog, we’re diving into how moving and Simplifying Your Data Node Migration with Graylog makes the process smooth, secure, and efficient.
  |  By Jeff Darrington
Logs are the notetakers for your Java application. In a meeting, you might take notes so that you can remember important details later. Your Java logs do the same thing for your application. They document important information about the application’s ability to function and problems that keep it from working as intended. Logs give you information to help fix coding errors, but they also give your end users information that helps them monitor performance and security.
  |  By Jeff Darrington
When DNS Says: Talk to the Hand! What? This started with a post on social media, which created a discussion among us industry professionals. The following conversation happened when I got to talk to my coworkers about some interesting things regarding DNS responses. Putting us gearheads in a room always results in an interesting comment or two!
  |  By Jeff Darrington
While “America runs on Dunkin”, IT increasingly runs on Linux. Between being open-source and highly customizable, everything from video games to enterprise servers can run on Linux. When cloud services took over the corporate IT environment, they brought Linux with them in the form of virtual servers and containers. Meanwhile, developers increasingly use Linux-based Docker to containerize applications and Kubernetes to manage the deployments.
  |  By Jeff Darrington
Imagine living in a world without caller ID, which is easy if you grew up in the “late 1900s.” Every time someone called, you had a conversation that followed this pattern: Hi! Who’s this? It’s Jeff! Hi Jeff! How’s it going? Today, most people already know who’s calling when they answer the phone because caller ID is built into smartphones and communications apps. As a developer, your Python logging is your application’s caller ID.
  |  By Ethan C. Keaton
In today’s distributed work environment, understanding the geographic origin of network traffic has become more crucial than ever. As organizations adapt to remote work, IT teams face the challenge of monitoring and analyzing an expanding array of IP addresses from various locations. Graylog’s geolocation feature offers a powerful solution to this challenge, allowing teams to extract and visualize geographic information from IP addresses in their logs.
  |  By Graylog
Are you experiencing performance issues with your Graylog instance? Are late-night alerts and unexplained slowdowns keeping you up at night? You're not alone if you’re dealing with license limit violations without a clear cause. In this session, we’ll share our experiences with these common Graylog challenges and the practical solutions we’ve developed to overcome them.
  |  By Graylog
So you’ve gone ahead and ingested every log you can think of and built a plethora of detections in line with frameworks and best practices. You may have even dabbled into custom alerts built from your own internal assessments and findings. Or maybe it’s the opposite; you’re still early in your journey toward security maturity or logging new or custom applications without much guidance. It can be hard to feel truly comfortable with your environment’s security in both situations. Standards are good but can be too noisy and restrictive in some places and too quiet or permissive in others.
  |  By Graylog
In this talk, we’ll explore the cutting-edge work InfusionPoints has done to process and enrich alerts from Graylog using Amazon Bedrock and advanced Large Language Models (LLMs) from Amazon Titan and Anthropic. Discover how we’ve harnessed the power of AI to elevate the accuracy, relevance, and actionable insights of our security alerts, transforming how we respond to potential threats.
  |  By Graylog
The session is really about customers spending their resources wisely, prioritizing use case development based on blind spots, weaknesses, or maybe even just plain audit findings. We have all been guilty in the past of spending a lot of time building clever use cases just for them to never fire or not work out the way we’d hoped; this talk is aimed at highlighting this issue and teach users to focus their resources and build a strategy for development like any other process they would internally.
  |  By Graylog
Join an engaging panel discussion featuring Graylog customers as they share their experiences and lessons learned on their journey with Graylog. Moderated by Mark Brooks, Graylog's Customer Success Officer, the panel will explore diverse use cases, the process of evaluating SIEM solutions, managing complex environments, and the unique advantages of leveraging open-source technology. Gain valuable insights from real-world implementations and discover how these organizations optimized their security operations using Graylog.
  |  By Graylog
Take a fast easy way to get Graylog installed using Docker to try it out!
  |  By Graylog
Take this upbeat journey installing Graylog V6.1 on Rocky Linux.
  |  By Graylog
Follow Carla Garcia Content Development Engineer at Graylog as she walks you through: Capture your Windows Logs!!
  |  By Graylog
Explore the new feature Data Routing in Graylog. This new feature allows you to route your data into Data Tiers for lower cost storage. Storing logs into Data Warehouse where ingestion does not count towards your licensing costs. Bring in those logs when required in an investigation or some other purpose.
  |  By Graylog
Step through a quick tour of the features and functionality in Graylog.
  |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
  |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
  |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
  |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
  |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.