Introducing Graylog 6.1: A Monster Release Just in Time for Halloween
It’s no coincidence that Graylog 6.1 is making its debut right before Halloween. This release is a true behemoth, designed to tackle some of the longest-standing and most challenging issues in Security Information and Event Management (SIEM). Packed with innovations, Graylog 6.1 is here to change the game. 1. Getting to the Alerts that […]
Understanding Java Logs
Logs are the notetakers for your Java application. In a meeting, you might take notes so that you can remember important details later. Your Java logs do the same thing for your application. They document important information about the application’s ability to function and problems that keep it from working as intended. Logs give […]
Simplifying Your Data Node Migration with Graylog
Migrating your data infrastructure can sound daunting, especially when you’re dealing with complex systems like OpenSearch. But what if it could be easier—almost ridiculously easy? If you’re thinking, “Hey, wait a second—could this be as seamless as it sounds?” You’re in for a pleasant surprise. In this blog, we’re diving into how moving and Simplifying […]
Assessing and Prioritizing Risk in Your Infrastructure
There are lots of hurdles to jump when trying to set up and maintain a SIEM. Preparing infrastructure and installing the software components, getting logs ingested into the system, parsing and normalizing those log messages properly, configuring alerts for detection, etc. These are all large tasks that require thoughtful planning and a lot of work […]
What is NIST 800-53?
Imagine compliance is like a driving application. You know your location and you plug in the destination address, then it shows you the route’s overview. If you want a more specific map, you can zoom in a bit and get more details. Similarly, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and […]
Logs in a SIEM: The Liquid Gold of Cybersecurity
Devices, applications, and systems logs are needed to detect, analyze, and mitigate cybersecurity threats. Logs in a SIEM are like gold; they are both valuable. Gold is part of the economy, and logs are part of the IT ecosystem and are the foundation for cybersecurity. Here’s why they compare to liquid gold! Raw Material: […]
When DNS Says: Talk To The Hand!

When DNS Says: Talk to the Hand! What? This started with a post on social media, which created a discussion among us industry professionals. The following conversation happened when I got to talk to my coworkers about some interesting things regarding DNS responses. Putting us gearheads in a room always results in an interesting comment […]
25 Linux Logs to Collect and Monitor

While “America runs on Dunkin”, IT increasingly runs on Linux. Between being open-source and highly customizable, everything from video games to enterprise servers can run on Linux. When cloud services took over the corporate IT environment, they brought Linux with them in the form of virtual servers and containers. Meanwhile, developers increasingly use Linux-based Docker […]
Python Logs: What They Are and Why They Matter

Imagine living in a world without caller ID, which is easy if you grew up in the “late 1900s.” Every time someone called, you had a conversation that followed this pattern: Hi! Who’s this? It’s Jeff! Hi Jeff! How’s it going? Today, most people already know who’s calling when they answer the phone because caller […]
Graylog API Security Content Pack: Changing the Game!

APIs form the backbone of modern digital systems, enabling seamless data exchange and integration. However, their critical role also makes them attractive targets for cyber threats. Traditional security measures often fail to address API-specific challenges effectively. Graylog API Security Content Pack emerges as a game-changer, reimagining API defense through innovative threat detection and response approaches. […]
How To Stop A DDoS Attack

On a Friday afternoon at 5 PM, you’re cruising along the backroads in your car, listening to your favorite music. You’re on vacation and making excellent time to your destination until you notice the long stream of red tail lights a few miles ahead. After sitting in standstill traffic for over an hour, you realize […]
Alert Notice: Opensearch V2.16 Update 2
Please be advised, an issue has been identified with Opensearch V2.16. Search queries in Opensearch generated from Alerting do not provide proper expected results. Graylog recommends only upgrading Opensearch to the supported release stated in the documentation, which can be found here. It is also recommended to pin your Opensearch release to the current supported […]