Graylog Open provides the core centralized log management functionality you need to collect, enhance, store, and analyze data. Support is through Graylog’s online resources, community, and other Open groups.
Easily create custom dashboards to visualize a variety of metrics and trends on a single page. Drill down from charts and tables to explore your data in-depth.
Build queries in minutes, execute them in milliseconds. Save and share complex queries with sophisticated data visualization outputs and data aggregation that allows for pivot table-like analysis.
Prevent data loss with the Graylog message journal in case of a network outage. Fault tolerance is built in to the product without requiring additional components and ensures distributed, load-balanced operation.
Use content packs—a combined set of inputs, extractors, streams, and dashboards--to bring in or share popular configurations in your environment to get up and running very quickly.
Use the Graylog Sidecar to manage flexible and stackable configurations for all log collectors, both Graylog and third-party, from one central interface. Tune logging on one, many, or all endpoints in seconds to adapt to new threats, performance issues, or other challenges in your on-premises and cloud infrastructures.
Delivered to you in a self-managed or cloud experience, Graylog Operations offers a powerful, flexible, and seamless centralized log management experience. built on the Graylog platform for IT, Network, and DevOps professionals to increase visibility into day-to-day operations, gain meaningful context from volumes of event log data, pinpoint errors, and take action faster, improving key metrics like Mean Time To Detect (MTTD) and Mean Time To Respond (MTTR).
Delivered to you in a self-managed or cloud experience, Graylog Security is a scalable cybersecurity solution that combines Security Information and Event Management (SIEM), threat intelligence, and anomaly detection capabilities to help your security professionals simplify identifying, researching, and responding to cyber threats while continuously strengthening your security posture.
JSON, CSV, TXT
Subscribe to the latest in log management, security, and all things Graylog Blog delivered to your inbox once a month.