Overview
What is Graylog?
Graylog, headquartered in Houston, offers their eponymous platform for centralized log management that helps users find meaning in data faster so as to take action immediately. Graylog is available via Enterprise and Cloud plans, but also has a Small Business…
Useful and free SIEM tool
Clean, robust and intuitive central logging
Graylog, Free Vs. Paid
Graylog can compete against the big boys.
Liven up your logging with Graylog!
Level Up Your Logging
Graylog is GREAT
Product Demos
Demo GrayLog 2 with Laravel5 app
Demo GrayLog 2 with Rails app
Send Syslog from MuleSoft RTF to GrayLog
Graylog Security
Product Details
- About
- Competitors
- Tech Details
- FAQs
What is Graylog?
Graylog Video
Graylog Competitors
Graylog Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, , |
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(29)Community Insights
- Business Problems Solved
- Pros
- Cons
- Recommendations
Graylog has proven to be a valuable solution for users in various industries, offering a range of use cases that address common challenges in log management and security monitoring. Users have successfully utilized Graylog as a centralized log aggregator and SEIM, enabling them to collect logs from multiple applications and sources in one central location. This has greatly simplified the process of tracking and tracing errors, saving valuable time when troubleshooting problems across their systems.
With Graylog's well-known plugin architecture, such as log4net for .NET developers, users have found it easy to integrate and utilize the platform. Additionally, Graylog's ability to extract values from logs and customize dashboards has enhanced its usability and provided users with greater searchability. By defining alerts for specific events or patterns, they are able to promptly identify and address potential issues.
Another significant use case for Graylog is its value in security-related tasks. Users have successfully employed Graylog to analyze access sign-in logs from various platforms and receive alerts when necessary. Additionally, its capability to collect messages from network devices like switches, routers, and wifi controllers has allowed users to group and visualize important information through graphs. This feature has proven particularly useful for monitoring critical events and ensuring prompt action.
The cost-effectiveness of Graylog combined with its customization options has contributed to its widespread adoption within organizations. Users across different teams are able to tailor the platform to their specific needs, making it a valuable tool for both log management and security monitoring purposes. From capturing NAT translations for DMCA-related notifications to serving as an internal syslog server, Graylog provides an efficient and accessible solution for aggregating logs and organizing them in a searchable manner.
Efficient log aggregation and intuitive dashboards: Multiple reviewers have praised Graylog for its efficient log aggregation pipeline, allowing users to easily collect and analyze logs from various sources. The clear and intuitive dashboards provided by Graylog were also highlighted as a positive aspect, making it easier for users to understand and monitor their logs effectively.
Powerful search options: Many reviewers have appreciated the powerful search capabilities offered by Graylog. Users mentioned that they can quickly search through large volumes of logs and easily find specific data without manual filtering. This feature enhances efficiency and saves time for users when troubleshooting or investigating issues.
Flexible configuration options: Users have commended Graylog for its flexibility in configuration. Some reviewers mentioned the ability to store everything on a single box, while others highlighted the option to scale out horizontally using a cluster of Elasticsearch nodes and MongoDB servers. This flexibility allows users to tailor their log management setup according to their specific needs and infrastructure requirements.
Unrealistic Pricing: Some users have expressed dissatisfaction with the pricing of the Enterprise version, considering it unrealistic for their needs.
Lack of Intuitive Configuration: Several reviewers have mentioned that configuring Graylog's backend, which relies on Elasticsearch and MongoDB, can be challenging for inexperienced users. It requires Linux knowledge and configuring three separate applications.
Difficulties in Log Management: Users have encountered difficulties in rotating indexes and managing log retention. They feel that there is no built-in feature to auto-delete logs or accurately estimate storage space needed, making log management a challenging task.
Users highly recommend Graylog for its efficiency in collecting information and managing records, emphasizing that it is suitable for any department and helps save time and increase productivity. It is particularly recommended for organizations dealing with large amounts of data.
Graylog is praised for fulfilling users' expectations at a low price point. It offers many useful features, making it a highly recommended logging and monitoring tool. Users find it easy to access and install, making it one of the best tools for log analysis and understanding product details at runtime.
Graylog is considered a good software for collecting records and analyzing data efficiently. It is particularly recommended for companies looking to monitor threats and analyze data effectively. Users appreciate its high functionality, optimal performance, and ability to handle large amounts of different data. Moreover, it generates confidence in its users while offering an economical price for its services.
Overall, users recommend carefully evaluating data requirements, having a solid understanding of Linux and the basics of MongoDB and Elasticsearch before using Graylog, as well as configuring a retention profile to avoid storage issues. It is also advised to research the competition before deciding on a logging solution and consider the deployment and system requirements before using Graylog.
Attribute Ratings
Reviews
(1-7 of 7)Useful and free SIEM tool
- Detecting user OS logins, or user logins from unknown IPs etc.
- Access attempts made on a firewall or other network infrastructure
- Monitoring changes to Active Directory Groups