General
Do I need to buy a license to use Graylog?
We believe software should be open and accessible to all. You should not have to pay to analyze your own data, no matter how much you have.
Graylog is licensed under the Server Side Public License. We do not require license fees for production or non-production use.
How long do you support older versions of the Graylog product?
For our commercial support customers, we support older versions of Graylog up to 12 months after the next major release is available. So if you’re using 1.X, you will continue to receive 1.X support up to a full year after 2.0 has been released.
Architecture
What is MongoDB used for?
Graylog uses MongoDB to store your configuration data, not your log data. Only metadata is stored, such as user information or stream configurations. None of your log messages are ever stored in MongoDB. This is why MongoDB does not have a big system impact, and you won’t have to worry too much about scaling it. With our recommended setup architecture, MongoDB will simply run alongside your graylog-server processes and use almost no resources.
Can you guide me on how to replicate MongoDB for High Availability?
MongoDB actually supplies this information as part of their documentation. Check out:
After you’ve done this, add all MongoDB nodes into the replica_set configuration in all graylog-server.conf files.
I have data centers across the world and do not want logs forwarding from everywhere to a central location due to bandwidth, etc. How do I handle this?
You can have multiple graylog-server instances in a federated structure, and forward select messages to a centralized GL server.
Which load balancers do you recommend we use with Graylog?
You can use any. We have clients running AWS ELB, HAProxy, F5 BIG-IP, and KEMP.
Isn’t Java slow? Does it need a lot of memory?
This is a concern that we hear from time to time.
We understand Java has a bad reputation from slow and laggy desktop/GUI applications that eat a lot of memory.
However, we are usually able to prove this assumption wrong. Well written Java code for server systems is very
efficient and does not need a lot of memory resources.
Give it a try, you might be surprised!
Does Graylog encrypt log data?
All log data is stored in Elasticsearch. Elastic recommends you use dm-crypt at the file system level.
Where are the log files Graylog produces?
You can find the log data for Graylog under the below directory with timestamps and levels and exception messages. This is useful for debugging or when the server won’t start.
/var/log/graylog-server/server.log
If you use the pre-build appliances, take a look into
/var/log/graylog/<servicename>/current
Installation / Setup
How do I find out if a specific log source is supported?
We support many log sources – and more are coming everyday. For a complete list, check out Graylog Marketplace, the central repository of Graylog extensions. There are 4 types of content on the Marketplace:
- Plug-Ins: Code that extends Graylog to support a specific use case that it doesn’t support out of the box.
- Content Pack: A file that can be uploaded into your Graylog system that sets up streams, inputs, extractors, dashboards, etc. to support a given log source or use case.
- GELF Library: A library for a programming language or logging framework that supports sending log messages in GELF format for easy integration and pre-structured messages.
- Other Solutions: Any other content or guide that helps you integrate Graylog with an external system or device. For example, how to configure a specific device to support a format Graylog understands out of the box.
Can I install the Graylog Server on Windows?
Running Graylog on Windows is not supported.
Can I run Graylog on Azure?
You can create a Linux VM and use our step-by-step to install your customized Graylog.
Functionality
Can Graylog automatically clean old data?
Absolutely we have data retention features.
Does Graylog support LDAP / Active Directory and its groups?
Yes, Graylog supports user authentication using LDAP and Active Directory. Graylog Operations additionally supports sychronization of LDAP and Active Directory groups into Graylog teams. See the authentication documentation for details.
Do we have a user audit log for compliance?
Graylog Operations includes audit log functionality. You can explore the documentation for more details.
Does Graylog have reporting functionality?
Since Graylog 3.0, Graylog Operations includes reporting capabilities. Take a look at the documentation for more details.
Can I filter inbound messages before they are processed by the Graylog server?
Yes, check out our page on how to use blacklisting.
Dedicated Partition for the Journal
If you create a dedicated Partition for your Kafka Journal, you need to watch that this is a clean directory. Even lost+found can break it, for your reference.
Raise the Java Heap
On Systems that are installed with DEB / APT
this setting can be made in /etc/default/graylog-server
.
Systems that are
installed with RPM / YUM / DNF the file is found in
/etc/sysconfig/graylog-server
.
How can I start an input on a port below 1024?
If you try to start an input on one of the
privileged ports, it will only work
for the “root” user. To be able to use a privileged port, you can use
authbind on Debian-based systems, or you redirect the traffic
with an iptables
rule like this:
iptables -t nat -A PREROUTING -p tcp --dport 514 -j REDIRECT --to 1514
iptables -t nat -A PREROUTING -p udp --dport 514 -j REDIRECT --to 1514
The input needs to be started on port 1514 in this case and will be made available on port 514 to the outside. The clients can then send data to port 514.
Graylog & Integrations
What is the best way to integrate my applications to Graylog?
We recommend that you use GELF. It’s easy for your application developers and eliminates the need to store the messages locally. Also, GELF can just send what app person wants so you don’t have to build extractors or do any extra processing in Graylog.
I have a log source that creates dynamic syslog messages based on events and subtypes and grok patterns are difficult to use - what is the best way to handle this?
Not a problem! Use our key=value extractor.
I want to archive my log data. Can I write to another database, for example HDFS / Hadoop, from Graylog?
Yes, you can output data from Graylog to a different database. We currently have an HDFS output
plug-in in the
Marketplace
- thank you sivasamyk !
It’s also easy and fun to
write your own, which you can then add to Graylog Marketplace for others to use.
I don’t want to use Elasticsearch as my backend storage system – can I use another database, like MySQL, Oracle, etc?
Currently you can’t. We only recommend another database if you want it for secondary storage.
How can I create a restricted user to check internal Graylog metrics in my monitoring system?
You can create a
restricted user which only has access to the /system/metrics
resource on the Graylog
REST API. This way it will be possible to integrate the internal metrics of Graylog into your monitoring
system. Giving the user only restricted access will minimize the impact of these credentials getting compromised.
Send a POST request via the Graylog API Browser or curl to the
resource of the
Graylog REST API:/roles
{ "name": "Metrics Access", "description": "Provides read access to all system metrics", "permissions": ["metrics:*"], "read_only": false }
The following curl command will create the required role (modify the URL of the Graylog REST API, here
https://127.0.0.1:9000/api/
, and the user credentials, here
admin
/
admin
,
according to your setup):
curl -u admin:admin -H "Content-Type: application/json" -H 'X-Requested-By: cli' -X POST -d '{"name": "Metrics Access", "description": "Provides read access to all system metrics", "permissions": ["metrics:*"], "read_only": false}' 'https://127.0.0.1:9000/api/roles'
Troubleshooting
I’m sending in messages, and I can see they are being accepted by Graylog, but I can’t see them in the search. What is going wrong?
A common reason for this issue is that the timestamp in the message is wrong. First, confirm that the message was received by selecting ‘all messages’ as the time range for your search. Then identify and fix the source that is sending the wrong timestamp.
I have configured an SMTP server or an output with TLS connection and receive handshake errors. What should I do?
Outbound TLS connections have CA (certification authority ) certificate verification enabled by default. In case the target server’s certificate is not signed by a CA found from trust store, the connection will fail. A typical symptom for this is the following error message in the server logs:
Caused by: javax.mail.MessagingException: Could not convert socket to TLS; nested exception is: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
This should be corrected by either adding the missing CA certificates to the Java default trust store (typically
found at $JAVA_HOME/jre/lib/security/cacerts
), or a custom store that is configured
(by using -
) for the Graylog server process. The same
procedure applies for both missing valid CAs and self-signed certificates.Djavax.net.ssl.trustStore
For Debian/Ubuntu-based systems
using OpenJDK JRE, CA certificates may be added to the system wide trust store. After installing the JRE (including
ca-certificates-java
, ergo ca-certificates
packages),
place name-of-certificate-dot-crt
(in PEM format) into /usr/local/share/ca-certificates/
and run /usr/sbin/update-ca-certificates
. The hook script in
/etc/ca-certificates/update.d/
should automatically generate
/etc/ssl/certs/java/cacerts
.
Fedora/RHEL-based systems may refer to Shared System Certificates in the Fedora Project Wiki.
Suddenly parts of Graylog did not work as expected
If you notice multiple
different non working parts in Graylog and found something like
in your Graylog Server logfile, you need to raise the process/thread
limit of the Graylog user. The limit can be checked with java.lang.OutOfMemoryError:
unable to create new native thread
ulimit -u
and you need to
check how you can raise nproc
in your OS.
I cannot go past page 66 in search results
Elasticsearch limits the number of messages per search result to 10000 by default. Graylog displays 150 messages per page, which means that the last full page with default settings will be page 66.
You can
increase the maximum result window by adjusting the parameter
index.max_result_window
as described in the
Elasticsearch
index modules dynamic settings, but be careful as this requires more memory in your Elasticsearch nodes for
deep pagination.
This setting can be
dynamically
updated in Elasticsearch, so that it does not require a cluster restart to be effective.
My field names contain dots and stream alerts do not match anymore
Due to restrictions in certain Elasticsearch
versions, Graylog needs to convert field names that contain .
characters with
another character, by default the replacement character is _
.
This replacement is done just prior to writing messages to Elasticsearch, which causes a mismatch between what stream rules and alert conditions see as field names when they are evaluated.
Stream rules, the conditions that determine whether or not a message is routed to a stream, are being run as data is being processed by Graylog. These see the field names as containing the dots.
However, alert conditions, which are also attached to streams, are converted to
searches and run in the background. They operate on stored data in Elasticsearch and thus see the replacement
character for the dots. Thus alert conditions need to use the _
instead of
.
when referring to fields. There is currently no way to maintain backwards
compatibility and transparently fixing this issue, so you need to take action.
The best option, apart from not
sending fields with dots, is to remember to write alert conditions using the replacement character, and never use
.
in the field names. In general Graylog will use the version with
_
in searches etc.
For example, if an incoming message contains the field
docker.container
stream rules use that name, whereas alert conditions need to use
docker_container
. You will notice that the search results also use the latter name.
What does “Uncommited messages deleted from journal” mean?
Some messages were deleted from the Graylog journal before they could be written to Elasticsearch. Please verify that your Elasticsearch cluster is healthy and fast enough. You may also want to review your Graylog journal settings and set a higher limit.
This can happen when Graylog is not able to connect to Elasticsearch or the Elasticsearch Cluster is not able to process the ingested messages in time. Add more resources to Elasticsearch or adjust the output settings from Graylog to Elasticsearch.
What does “Journal utilization is too high” mean?
Journal utilization is too high and may go over the limit soon. Please verify that your Elasticsearch cluster is healthy and fast enough. You may also want to review your Graylog journal settings and set a higher limit.
This can happen when Graylog is not able to connect to Elasticsearch or the Elasticsearch Cluster is not able to process the ingested messages in time. Add more resources to Elasticsearch or adjust the output settings from Graylog to Elasticsearch.
How do I fix the “Deflector exists as an index and is not an alias” error message?
Graylog is using an Elasticsearch index
alias per index set pointing to the active write index, the so-called “deflector,” to write messages into
Elasticsearch such as graylog_deflector
in the default index set.
Please refer to Index model for a more in-depth explanation of the Elasticsearch index model used by Graylog.
In some rare situations, there might be an Elasticsearch index with a name which has been reserved for the deflector of an index set managed by Graylog, so that Graylog is unable to create the proper Elasticsearch index alias.
This error situation leads to the following system notification in Graylog:
> Deflector exists as an index and is not an alias.> The deflector is meant to be an alias but exists as an index. Multiple failures of infrastructure can lead to this . Your messages are still indexed but searches and all maintenance tasks will fail or produce incorrect results. It is strongly recommend that you act as soon as possible.
The logs of the Graylog leader node will contain a warning message similar to the following:
WARN [IndexRotationThread] There is an index called [graylog_deflector]. Cannot fix this automatically and published a notification.
- Stop all Graylog nodes
- (OPTIONAL ) If you want to keep the already ingested messages, reindex them into the Elasticsearch
index with the greatest number, e. g.
if you want to fix the deflectorgraylog_23
graylog_deflector
, via the Elasticsearch Reindex API. - Delete the
index via the Elasticsearch Delete Index API.graylog_deflector
- Add
action.auto_create_index: false
to the configuration files of all Elasticsearch nodes in your cluster and restart these Elasticsearch nodes, see Elasticsearch Index API - Automatic Index Creation and Creating an Index for details. - Start the Graylog leader node.
- Manually rotate the active write index of the index set on the System / Indices / Index Set page in the Maintenance drop down menu.
- (OPTIONAL ) Start all remaining Graylog follower nodes.
How do I enable debug logging for a specific plugin or area of Graylog?
When troubleshooting an issue in
Graylog, it might be useful to enable debug
or trace
logging
for the entire Graylog subsystem in (System > Logging ). However, you may find that this generates too
much log output (possibly making it difficult to review log messages for a particular area of concern).
Graylog
supports the ability to enable debug
or trace
logging
for specific application areas or plugins. To do this, execute the following terminal command against a particular
Graylog node:
curl -I -X PUT https://<graylog-username>:<graylog-password>@<graylog-node-ip>:9000/api/system/loggers/<application-package>/level/debug \\-H 'X-Requested-By: graylog-api-user'
application-package
is the Java package for the area of
concern (eg. org.graylog.aws
for the AWS plugin or org.graylog2.lookup
for
Lookup Tables). You might need to look at the Graylog source code to identify the desired application-package.
Have another troubleshooting question?
See below for some additional support options where you can ask your question.
Support
I think I’ve found a bug, how do I report it?
Think you spotted a bug? Oh no! Please report it in our issue trackers so we can take a look at it. All issue trackers are hosted on GitHub, tightly coupled to our code and milestones. Don’t hesitate to open issues – we’ll just close them if there is nothing to do. Most issues will be in the Graylog server repository, but you should choose others if you have found a bug in one of the plugins.
I’m having issues installing or configuring Graylog, where can I go for support?
Check out the Graylog Community Forums – you can search for your problem which may already have an answer, or post a new question.
Another source is the Graylog channel on Matrix.org or the #graylog IRC chat channel on freenode (both are bridged, so you’ll see messages from either channels). Our developers and a lot of community members hang out here. Just join the channel and add any questions, suggestions or general topics you have.
If you’re looking for professional commercial support from the Graylog team, we do that too. Please get in touch here for more details.