Network Connectivity and Firewall Requirements
Graylog can be deployed in highly restricted and air-gapped environments, but doing so requires a clear understanding of which network connections are required, optional, or unavailable in locked-down scenarios. This topic consolidates Graylog firewall, port, and outbound connectivity requirements into a single reference for security and network teams.
Deployment Connectivity Model
Graylog connectivity requirements fall into two categories:
- Server-side connectivity: outbound connections initiated by Graylog server components
- Browser-side connectivity: connections initiated by the user’s browser while accessing the Graylog interface
In mixed environments, browser-side features may still work if the user workstation has internet access even when Graylog servers do not.
Server-to-Server Network Ports
These ports are used for communication between Graylog components. If blocked, core functionality may be impacted. For a full list of default network ports used by Graylog, see Default Ports.
|
Source |
Destination |
Default Port |
Protocol |
Purpose |
|---|---|---|---|---|
|
Graylog Server |
Graylog Data Node / OpenSearch |
9200 |
TCP |
Search and indexing operations |
|
Graylog Server |
Graylog Data Node |
8999 |
TCP |
Data Node management, coordination, and health |
|
Graylog Server |
MongoDB |
27017 |
TCP |
Metadata and configuration storage |
|
User’s Browser |
Graylog Server |
9000 |
TCP |
Web interface and REST API |
Outbound Connectivity from Graylog Server
These endpoints are contacted by the Graylog server. Blocking them disables or limits the associated functionality.
|
Feature |
Destination URL |
Behavior if Blocked |
|---|---|---|
|
Illuminate content installation |
Illuminate packs must be delivered and uploaded manually |
|
|
Version checks |
The UI will not show update notifications |
|
|
Remote license verification |
Standard licenses with remote checks enabled eventually become invalid without periodic verification |
|
|
Package installation and upgrades |
OS-level installs and upgrades via package manager are unavailable |
|
|
Manual downloads |
Manual retrieval of Graylog artifacts from the public site is unavailable |
*.cloudfront.net.
Licensing Considerations in Air-Gapped Environments
Standard Graylog licenses require periodic validation. For fully air-gapped environments, contact your Customer Success Manager to request a license designed for offline use.
Browser-Based Connectivity
These endpoints are accessed directly from the user’s browser while interacting with the Graylog interface.
|
Feature |
Destination URL |
Behavior if Blocked |
|---|---|---|
|
Homepage news feed |
Feed fails silently |
|
|
Map widget tiles |
The map loads but background tiles are blank |
|
|
Anonymized telemetry submission |
Telemetry cannot be submitted |
Telemetry Control
Telemetry can be disabled globally by setting telemetry_enabled = false in server.conf. See Configuration Settings for more information.
Graylog Security External Lookups
Graylog Security provides convenience links from value menus for contextual lookups. These links open in your browser and do not require server-side connectivity.
IP Address Lookups
When viewing IP address values in Graylog Security, the value menu may include links to external threat intelligence services to provide reputation and infrastructure context. These links help analysts determine whether an IP is associated with scanning activity, abuse, or known malicious behavior.
Hash Lookups
For file hash values, Graylog provides links to external malware intelligence and analysis platforms. These services allow analysts to quickly assess whether a hash is associated with known malware or suspicious files.
If browser internet access is restricted, these links will be unavailable without impacting core Graylog functionality.
External Lookup Tables
If Graylog is configured to use external lookup tables, the node performing the lookup must have outbound access to the external data source. Requirements vary based on the lookup implementation.
Further Reading
Explore the following additional resources and recommended readings to expand your knowledge on related topics:
