Der Azubi hat einen #Graylog Server zum Sammeln und Auswerten der ganzen Firewall Logs aufgesetzt. Hat er echt gut hinbekommen. 👍

#sysadmin #sysadminlife

@mensrea @elena honestly, I self-host #splunk for my own needs.
I’m using it at home (free 500MB/day license) and at work (old enterprise perpetual license) for more than 12 years now.

It’s FREAKING good. I can’t find a decent contender in the #FOSS world for the enterprise version. For the free tier (striped down version without user profile, alerting, etc.), things like #graylog or #wazuh can be great alternatives.
Still, deployment of Splunk is super easy.

Grateful and humbled. Another RSA in the books, great conversations, and new hardware to show for it.

Thanks to all who stopped by and chatted with us.

#RSAC2026 #Graylog #SIEM #CyberSecurity

Grateful and humbled. Another RSA in the books, great conversations, and new hardware to show for it. Thanks to all who stopped by and chatted with us. #RSAC2026 #Graylog #SIEM #CyberSecurity

Dank #elasticsearch und #graylog geht uns der Plattenplatz aus. Wir haben pro Tag etwa 60GB pro #rechenzentrum

Macht macht man also? Neue Platten kaufen. Wären in unserem Fall: 33 x 3TB. Kosten aktuell: 100.000€ .. und vermutlich wären das die letzten Platten, die wir 2026 bekommen .. zu einem Preis, den man noch "normal" nennen darf. Angebot endet morgen um 23:59 ...

Ich bin gespannt, ob die Firma das genehmigt.

⚠️ CVE-2026-1435 (CRITICAL): Graylog Web Interface 2.2.3 fails to expire old sessions, enabling token reuse & unauthorized access. Restrict access, enable MFA, and monitor sessions until patch is released. Details: https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982 #OffSeq #Graylog #Vuln #Security
"Starting with Graylog 7.0, the use of Elasticsearch as a search backend is deprecated. It will be removed entirely in Graylog 8.0. Users are encouraged to migrate to Data Node or OpenSearch."

Nice.

#Graylog #OSS

Security analysts face an impossible challenge: finding the one suspicious signal hidden inside billions of normal events.

That’s why anomaly detection with machine learning matters. By learning behavioral baselines, ML can surface:
- unusual logins
- lateral movement
- zero-day malware behaviors
- insider risk patterns

High-fidelity detection without the noise.
Click here: https://graylog.org/post/anomaly-detection-with-machine-learning-to-improve-security/
#CyberSecurity #MachineLearning #Graylog

Anomaly Detection with Machine Learning to Improve Security

Learn how machine-learning–driven anomaly detection enhances security and performance by identifying behavioral deviations in real time. Explore how enriched logs, behavioral baselines, and automated scoring deliver high-fidelity insights and faster response.

Graylog
Security today is “Where’s Waldo” at terabyte scale. ML-powered anomaly detection helps teams spot the behaviors that don’t fit the norm, from zero-days to insider threats without drowning in alerts. Click here: graylog.org/post/anomaly... #CyberSecurity #MachineLearning #Graylog

Anomaly Detection with Machine...
Anomaly Detection with Machine Learning to Improve Security

Learn how machine-learning–driven anomaly detection enhances security and performance by identifying behavioral deviations in real time. Explore how enriched logs, behavioral baselines, and automated scoring deliver high-fidelity insights and faster response.

Graylog
Monitoring detects issues — observability helps you understand why they happen. In modern distributed systems, you need both. New blog: Monitoring vs. Observability + the pillars of telemetry (logs, metrics, traces). 👉 graylog.org/post/observa... #Observability #DevOps #Graylog

Observability vs Monitoring: G...
Observability vs Monitoring: Getting a Full Picture of the Environment

Gain insights into observability and monitoring, two key concepts in maintaining system health. Explore their roles and how they complement each other.

Graylog