Set Up Graylog

While installing Graylog is just the beginning, further configuration and setup are necessary to make your environment fully operational. In fact, many of these processes are tasks you might need to return to as your Graylog environment grows and changes over time.

In this section, you will find important server configuration information, user management and provisioning procedures, and other topics to get your Graylog environment up and running.

Configuration Settings

Graylog includes several important configuration files with which you will need to be familiar. Some configuration must be completed during installation while additional configuration steps can be completed only after installation is complete. See Configuration Settings for complete details.

User Authentication

All users accessing your Graylog environment must be properly authenticated. In User Authentication, we explore how Graylog provides both manual user management, performed by an administrator within the Graylog interface, and integration with your organization’s identity provider to allow you to establish single sign-on (SSO).

Permission Management

Graylog includes a robust and granular permission management system so that you can control user access to the entities in your environment. Review Permission Management to learn how these can be applied either to individual users or to teams in which users belong, and procedures for creating and managing both are found in this section. The Graylog permission management model can help you achieve better data security and forms an important part of security compliance.

The Web Interface

The Graylog Web Interface is where you perform most of your work and interact with Graylog capabilities such as searching and analyzing your indexed data and configuring your Graylog environment. This section shows how to access the web interface and ways you can customize the appearance and performance of the interface.

Integration and Extension

You might have specific needs in your environment that are not easily met by the basic Graylog application. To meet this challenge, Integration and Extension details how Graylog provides tools both to extend the application’s reach and usefulness as well as to integrate with other tools you might already be using.