When DNS Says: Talk To The Hand!

A DNS Chat between Grayloggers

When DNS Says: Talk to the Hand! What? This started with a post on social media, which created a discussion among us industry professionals. The following conversation happened when I got to talk to my coworkers about some interesting things regarding DNS responses. Putting us gearheads in a room always results in an interesting comment […]

25 Linux Logs to Collect and Monitor

Linux Logs to Collect and Monitor

While “America runs on Dunkin”, IT increasingly runs on Linux. Between being open-source and highly customizable, everything from video games to enterprise servers can run on Linux. When cloud services took over the corporate IT environment, they brought Linux with them in the form of virtual servers and containers. Meanwhile, developers increasingly use Linux-based Docker […]

Graylog Academy: Free On-Demand Training Available

Free Online Graylog Analyst Training   Efficient log management and analysis are crucial for maintaining robust IT infrastructures. To empower IT professionals and enthusiasts with the skills needed to harness the power of log data. Sign up at the Graylog Academy and take our Free Online Graylog Analyst Training!    Why Graylog? Graylog is a […]

Python Logs: What They Are and Why They Matter

Imagine living in a world without caller ID, which is easy if you grew up in the “late 1900s.” Every time someone called, you had a conversation that followed this pattern: Hi! Who’s this? It’s Jeff! Hi Jeff! How’s it going? Today, most people already know who’s calling when they answer the phone because caller […]

Graylog API Security Content Pack: Changing the Game!

APIs form the backbone of modern digital systems, enabling seamless data exchange and integration. However, their critical role also makes them attractive targets for cyber threats. Traditional security measures often fail to address API-specific challenges effectively. Graylog API Security Content Pack emerges as a game-changer, reimagining API defense through innovative threat detection and response approaches. […]

How To Stop A DDoS Attack

On a Friday afternoon at 5 PM, you’re cruising along the backroads in your car, listening to your favorite music. You’re on vacation and making excellent time to your destination until you notice the long stream of red tail lights a few miles ahead. After sitting in standstill traffic for over an hour, you realize […]

Alert Notice: Opensearch V2.16 Update 2

Please be advised, an issue has been identified with Opensearch V2.16. Search queries in Opensearch generated from Alerting do not provide proper expected results. Graylog recommends only upgrading Opensearch to the supported release stated in the documentation, which can be found here. It is also recommended to pin your Opensearch release to the current supported […]

Enhanced Compliance Monitoring with NIST 800-53 Integration

Illuminate 5.1.0 is now available, bringing substantial improvements to our compliance capabilities. This update represents a significant step forward, with NIST 800-53 as the cornerstone of our compliance framework. Let’s explore the key features and improvements implemented to support your organization’s security and compliance needs.   Important Note: To run Illuminate 5.1.0, your environment must […]

How-To Guide: Securing Graylog with TLS

Welcome to our technical blog, where we’ll be diving into the world of Graylog and how you can secure your Graylog Server with Transport Layer Security (TLS). As an admin or a tech-savvy user, you know the importance of protecting your Graylog Server and the logs it manages from unauthorized access. TLS is a robust […]

Threat Detection and Incident Response with MITRE ATT&CK and Sigma Rules

Being a security analyst tracking down threats can feel like being the Wile E. Coyote to an attacker’s Road Runner. You’re fast, but they’re faster. You set up alerts, but they still manage to get past your defenses. You’re monitoring systems, but they’re still able to hide their criminal activities.   Threat detection and incident […]

Graylog Geolocation: Mapping Your Log Data

In today’s distributed work environment, understanding the geographic origin of network traffic has become more crucial than ever. As organizations adapt to remote work, IT teams face the challenge of monitoring and analyzing an expanding array of IP addresses from various locations. Graylog’s geolocation feature offers a powerful solution to this challenge, allowing teams to […]

GraylogGO: Call For Speakers

Help us shape the Graylog GO agenda! We’re looking for dynamic speakers to share their experiences and insights with our virtual community. Whether your expertise is in using Graylog for cybersecurity or log management, your voice can make a difference. What Are We Looking For? Solving Cybersecurity Problems With These Tracks This track explores advanced […]