SlideShare a Scribd company logo
Open Source
TCP or
Netflow Log
Server
Using
Graylog
Agenda
How to create netflow log
server using Graylog
[alternative of nfdump/nfsen]
Create your own TCP based log
server for Mikrotik NAT devices
with zero cost and how to meet
regulatory requirements.
Analyze traffic flow and
create custom dashboard for
visualization.
Finally exporting your
netflow or tcp logs data to
grafana for further analysis
Why we
need a
log
server?
• Consolidates logs from multiple
sources into a single platform.
• Simplifies log analysis and
troubleshooting.
• Ensures compliance with industry
regulations by maintaining audit
trails.
• Enhances performance monitoring
and issue diagnosis.
• Reduces the time and effort
required to search and analyze
logs.
Open Source Solutions: Graylog and
ELK Stack, NFsen are excellent
open-source options for handling
NetFlow data, offering flexibility
and powerful visualization.
Paid Solutions: like SolarWinds
NetFlow Traffic Analyzer, PRTG
Network Monitor, and ManageEngine
NetFlow Analyzer etc provide
Sample
Network
with a
log
Server
Netflow
Sample
Configurati
on:
Mikrotik
TCP logs sample
configuration:
Mikrotik
Overview
of
Graylog
Graylog is an open-source
log management tool.
Real-time search and
analysis, alerting,
dashboards, and more.
Scalability, flexibility,
user-friendly interface,
and strong community
support
Understand
ing TCP
and
Netflow
Logs
Netflow Logs:
NetFlow is a network protocol developed
by Cisco for collecting and monitoring IP
traffic data. It helps network
administrators analyze traffic patterns,
monitor performance, and troubleshoot
issues.
• Key Components:
• NetFlow Exporter: Collects and
exports flow data.
• NetFlow Collector: Receives and
stores flow data.
• NetFlow Analyzer: Analyzes and
visualizes the data.
• NetFlow Versions:
• NetFlow v5: Widely used, standard
version.
• NetFlow v9: Template-based, more
flexible and extensible.
Understand
ing TCP
and
Netflow
Logs
• Here are the most important fields:
• Source IP Address: The IP address of the device
that sent the packets.
• Destination IP Address: The IP address of the
device that received the packets.
• Source Port: The port number on the source
device.
• Destination Port: The port number on the
destination device.
• Layer 3 Protocol Type: The type of protocol used
(e.g., TCP, UDP).
• Type of Service (ToS): Quality of service
information.
• Input Interface: The network interface that
received the packets.
• Output Interface: The network interface that
sent the packets.
• Packet Count: The number of packets in the flow.
• Byte Count: The total number of bytes in the
flow.
• Flow Start Timestamp: The time when the flow
started.
• Flow End Timestamp: The time when the flow
ended.
• Next Hop IP Address: The IP address of the next
hop router.
• Source AS (Autonomous System): The AS number of
the source device.
• Destination AS: The AS number of the destination
device.
Understand
ing TCP
and
Netflow
Logs
TCP Logs:
TCP logs capture detailed information
about TCP connections and their states.
These logs help network administrators
monitor traffic, diagnose issues, and
ensure reliable network communication.
• Common TCP Flags:
• SYN (Synchronize): Initiates a
connection.
• ACK (Acknowledgment): Acknowledges
received data.
• FIN (Finish): Indicates the sender is
finished sending data.
• RST (Reset): Abruptly terminates a
connection.
• PSH (Push): Indicates that data
should be pushed to the receiving
application.
• URG (Urgent): Indicates that urgent
data is being sent.
Understand
ing TCP
and
Netflow
Logs
1.Source IP Address: The IP address of the
device that initiated the connection.
2.Destination IP Address: The IP address
of the device that received the
connection request.
3.Source Port: The port number on the
source device.
4.Destination Port: The port number on the
destination device.
5.Timestamp: The date and time when the
log entry was recorded.
6.TCP Flags: Indicators of the state of
the TCP connection, such as SYN, ACK,
FIN, and RST.
7.Sequence Numbers: Used to ensure data is
transmitted and received in the correct
order.
8.Acknowledgment Numbers: Confirm receipt
of packets.
9.Window Size: Indicates the amount of
data that can be sent before receiving an
acknowledgment.
10.Connection State: Describes the current
state of the TCP connection (e.g.,
established, closed).
Setting
Up
Graylog
for TCP
and
Netflow
Logs
• System Requirements:
• Hardware and software
requirements for installing
Graylog.
• Installation Steps:
• Installing prerequisites
(Java, MongoDB,
Elasticsearch).
• Installing Graylog.
• Configuration:
• Basic configuration steps for
Graylog.
• Setting up inputs for TCP and
Netflow logs.
https://go2docs.graylog.org/current/downloading
_and_installing_graylog/installing_graylog.html
Collecti
ng and
Processi
ng Logs
Configuring Inputs:
Inputs in Graylog are used to receive log messages from various
sources. Configuring inputs is the first step in collecting and
analyzing log data.
1. Accessing Inputs
• Navigate to the Graylog web interface.
• Go to System > Inputs.
2. Selecting Input Type
• Click on Select input.
• Choose the type of input based on the log source
(e.g., Syslog, NetFlow UDP).
3. Configuring Input Details
• Fill in the necessary details:
• Title: Name of the input.
• Port: The port on which Graylog will
listen for incoming messages.
• Bind Address: The IP address to bind the
input to.
• Additional Parameters: Depending on the
input type, additional configurations may
be required.
4. Starting the Input
• Click Launch new input to start the input.
• Verify that the input is running and receiving
messages.
Collecting and
Processing Logs
• Example: Configuring a Syslog UDP
Input
• Title: Syslog UDP
• Port: 514
• Bind Address: 0.0.0.0 (all network
interfaces)
• Save and launch the input.
Collecti
ng and
Processi
ng Logs
Log Parsing:
Log Parsing is the process of analyzing and
extracting meaningful data from log files. It
involves converting raw log data into structured
information for easier analysis and monitoring.
1. Creating Extractors in Graylog
• Navigate to System > Inputs.
• Select the input you want to add an extractor
to.
• Click on Manage Extractors.
2. Defining an Extractor
• Choose an extractor type (e.g., GROK, JSON,
Regex).
• Define the parsing rule to extract fields from
log messages.
• Test the extractor with sample log data to
ensure accuracy.
3. Saving and Using Extractors
• Save the extractor.
• Graylog will apply the extractor to incoming
log messages on the selected input.
• Extracted fields will be available for
searching and analysis.
Collecting
and
Processing
Logs
prerouting: in:<pppoe-ram-ruhul@v> out:(unknown
0), connection-state:established,snat proto TCP
(ACK,FIN), 10.64.4.28:55842-
>23.212.164.120:443, NAT (10.64.4.28:55842-
>103.234.202.0:55842)->23.212.164.120:443
grok_pattern: NAT
(%{IP:internal_ip}:%{NUMBER:internal_port}-
>%{IP:nat_ip}:%{NUMBER:nat_port})-
>%{IP:destination_ip}:%{NUMBER:destination_port
}, len %{NUMBER:length}
Collecti
ng and
Processi
ng Logs
Log Storage and Retention:
1. Setting Up Log Storage
• Use Elasticsearch as the primary storage backend for
Graylog.
• Ensure Elasticsearch is configured for high availability
and scalability.
2. Configuring Retention Policies in Graylog
• Navigate to System > Indices.
• Define retention policies based on index sets.
• Options include:
• Time-based retention: Retain logs for a specified
period.
• Size-based retention: Retain logs until a certain
index size is reached.
• Combined retention: Use both time and size-based
retention.
3. Implementing Log Rotation
• Configure index rotation strategies:
• Time-based rotation: Rotate indices daily, weekly,
etc.
• Size-based rotation: Rotate indices when they reach
a specific size.
4. Monitoring Storage and Retention
• Use Graylog's built-in monitoring tools to track storage
usage and retention compliance.
• Set up alerts for when storage limits are approaching.
Collecting
and
Processing
Logs
Log Storage and Retention:
Example: Rotate indices daily and
retain logs for 30 days.
Analyzin
g Logs
with
Graylog
Search and Filter:
• Search: The ability to query log data to
find specific information.
• Filter: Narrowing down search results
to show only relevant log entries.
• Accessing the Search Interface,
Navigate to the Graylog web interface.
Click on Search in the top menu.
• Performing a Basic Search
• Enter keywords in the search bar.
• Use common fields like message,
source, and timestamp
• Using Time Range Filters
• Select a predefined time range (e.g.,
last 5 minutes, last 24 hours).
• Customize the time range using the
date and time picker.
Analyzing
Logs with
Graylog
• Example:
• Filter by log level: level:ERROR
• Filter by IP address: source_ip:192.168.1.1
• Search for login failures: message:login AND
message:failed
• Filter by user or IP address: user:admin
Analyzing Logs with Graylog
Creating Dashboards:
1. Accessing the Dashboard Interface
• Navigate to the Graylog web interface.
• Click on Dashboards in the top menu.
2. Creating a New Dashboard
• Click on Create new dashboard.
• Provide a name and description for the dashboard.
Analyzing Logs with
Graylog
Analyzing
Logs with
Graylog
Alerting and Notifications:
Automated triggers for specific events or
conditions is possible and also
notification of those alert via
Email/API/Slack is support. Some features
are only supported by Graylog Enterprise
Edition.
Share
Dashboard
with others
• Add Users/Teams: Enter the usernames or teams you want to share the
dashboard with.
• Assign Roles:
• Viewer: Can view the dashboard.
• Editor: Can edit the dashboard.
• Owner: Full control over the dashboard, including sharing
settings.
Use Cases and Examples [TCP
flow Dashboard]
Use Cases and Examples [TCP
flow Dashboard]
Use Cases and Examples
[Netflow Dashboard]
Use Cases and Examples
[Grafana Dashboard]
Integration steps for
Grafana
Best Practices and Tips
Security Considerations:
• Ensuring secure log transmission and storage.
Performance Optimization:
• Tips for optimizing Graylog performance.
Community and Support:
• Leveraging the Graylog community for support and collaboration.
Thank You!!!

More Related Content

PPTX
Fibre concrete
PPTX
CON 122 Session 3 - Air-Entraining Admixtures
PPT
Development of Low Carbon Cement
PDF
Experimental study of effects of potassium carbonate on strength parameters o...
PDF
Light weight concrete
PPTX
Waterproofing materials
PPTX
Chemical attack on concrete
PPTX
Green concrete
Fibre concrete
CON 122 Session 3 - Air-Entraining Admixtures
Development of Low Carbon Cement
Experimental study of effects of potassium carbonate on strength parameters o...
Light weight concrete
Waterproofing materials
Chemical attack on concrete
Green concrete

What's hot (11)

PPT
Ppt of green concrete
PPTX
Flyash in roads
PPTX
Stabilisation of clayey soil using silica fume and cement
PPTX
special types of concrete
PPTX
Cement, Cement manufacturing, Types of cement
PPTX
Plywood manufacturing types uses
PPTX
Concrete Technology: Chemical and Mineral Admixture
PPTX
Geosynthetics
PPTX
Materials for Repair (part 1) (RR&S)
PDF
Soil - Basic Definitions & Relationships
Ppt of green concrete
Flyash in roads
Stabilisation of clayey soil using silica fume and cement
special types of concrete
Cement, Cement manufacturing, Types of cement
Plywood manufacturing types uses
Concrete Technology: Chemical and Mineral Admixture
Geosynthetics
Materials for Repair (part 1) (RR&S)
Soil - Basic Definitions & Relationships
Ad

Similar to Open Source TCP or Netflow Log Server Using Graylog (20)

PDF
Graylog for open stack 3 steps to know why
PPTX
Graylog for open stack 3 steps to know why
PDF
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
PDF
OSMC 2015 | Monitoring Linux and Windows Logs with the Graylog Collector by B...
PDF
wireshark.pdf
PDF
Monitoring with Syslog and EventMachine
ODP
Turbo charge your logs
PPT
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
PPT
Traffic monitoring
PDF
Monitoring with Syslog and EventMachine (RailswayConf 2012)
PPTX
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PDF
Graylog
PDF
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
PDF
Log Management: AtlSecCon2015
DOCX
Chapter 3. sensors in the network domain
ODP
Logitoring - log-driven monitoring and the Rocket science
PDF
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
Graylog for open stack 3 steps to know why
Graylog for open stack 3 steps to know why
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
OSMC 2015 | Monitoring Linux and Windows Logs with the Graylog Collector by B...
wireshark.pdf
Monitoring with Syslog and EventMachine
Turbo charge your logs
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
Traffic monitoring
Monitoring with Syslog and EventMachine (RailswayConf 2012)
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Graylog
Teach your application eloquence. Logs, metrics, traces - Dmytro Shapovalov (...
Log Management: AtlSecCon2015
Chapter 3. sensors in the network domain
Logitoring - log-driven monitoring and the Rocket science
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
Ad

More from Bangladesh Network Operators Group (20)

PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
IPv6 Mostly Experience at APRICOT by Yoshinobu Matsuzaki (IIJ)
PDF
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
PDF
DDoS Mitigation Strategies by Md. Abdul Awal
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
PPTX
The Internet Service Providers and Connectivity Providers of ICANN
PPTX
Integration of AI and GenAI in Education and beyond
PPTX
Strengthening Cyber Security with Tools and Human Expertise
PDF
Mental Health and Workplace Culture in Tech:A Personal Perspective
PDF
Network Efficiency:The LLM Advantage on network infrastructures
PDF
Utilizing Free and open-source Technology and Achieve Next Generation Enterpr...
PPTX
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
PPTX
Maximizing Network Efficiency with Large Language Models (LLM)
PPTX
Geolocation and Geofeed Implementation bdNOG18
PDF
Data Centre Design Consideration for Bangladesh
PDF
DNS Troubleshooting - Assumptions and Problem Breakdown
PPTX
Team Cymru Community Services,Overview of all public services
PPTX
Enhancing seamless access using TIGERfed
PPTX
Software Defined Networking, Concepts and Practical Implementations
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
IPv6 Mostly Experience at APRICOT by Yoshinobu Matsuzaki (IIJ)
Fast Reroute in SR-MPLS by Md Abdullah Al Naser
DDoS Mitigation Strategies by Md. Abdul Awal
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
Optics101 for non-Optical (IP) folks by Tashi Phuntsho
The Internet Service Providers and Connectivity Providers of ICANN
Integration of AI and GenAI in Education and beyond
Strengthening Cyber Security with Tools and Human Expertise
Mental Health and Workplace Culture in Tech:A Personal Perspective
Network Efficiency:The LLM Advantage on network infrastructures
Utilizing Free and open-source Technology and Achieve Next Generation Enterpr...
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
Maximizing Network Efficiency with Large Language Models (LLM)
Geolocation and Geofeed Implementation bdNOG18
Data Centre Design Consideration for Bangladesh
DNS Troubleshooting - Assumptions and Problem Breakdown
Team Cymru Community Services,Overview of all public services
Enhancing seamless access using TIGERfed
Software Defined Networking, Concepts and Practical Implementations

Recently uploaded (20)

PPTX
Funds Management Learning Material for Beg
PPTX
Digital Literacy And Online Safety on internet
PPTX
Internet___Basics___Styled_ presentation
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
innovation process that make everything different.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
artificial intelligence overview of it and more
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
Funds Management Learning Material for Beg
Digital Literacy And Online Safety on internet
Internet___Basics___Styled_ presentation
Job_Card_System_Styled_lorem_ipsum_.pptx
The Internet -By the Numbers, Sri Lanka Edition
The New Creative Director: How AI Tools for Social Media Content Creation Are...
innovation process that make everything different.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
QR Codes Qr codecodecodecodecocodedecodecode
Module 1 - Cyber Law and Ethics 101.pptx
Paper PDF World Game (s) Great Redesign.pdf
RPKI Status Update, presented by Makito Lay at IDNOG 10
Cloud-Scale Log Monitoring _ Datadog.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
WebRTC in SignalWire - troubleshooting media negotiation
artificial intelligence overview of it and more
SASE Traffic Flow - ZTNA Connector-1.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Introuction about WHO-FIC in ICD-10.pptx

Open Source TCP or Netflow Log Server Using Graylog

  • 1. Open Source TCP or Netflow Log Server Using Graylog
  • 2. Agenda How to create netflow log server using Graylog [alternative of nfdump/nfsen] Create your own TCP based log server for Mikrotik NAT devices with zero cost and how to meet regulatory requirements. Analyze traffic flow and create custom dashboard for visualization. Finally exporting your netflow or tcp logs data to grafana for further analysis
  • 3. Why we need a log server? • Consolidates logs from multiple sources into a single platform. • Simplifies log analysis and troubleshooting. • Ensures compliance with industry regulations by maintaining audit trails. • Enhances performance monitoring and issue diagnosis. • Reduces the time and effort required to search and analyze logs. Open Source Solutions: Graylog and ELK Stack, NFsen are excellent open-source options for handling NetFlow data, offering flexibility and powerful visualization. Paid Solutions: like SolarWinds NetFlow Traffic Analyzer, PRTG Network Monitor, and ManageEngine NetFlow Analyzer etc provide
  • 7. Overview of Graylog Graylog is an open-source log management tool. Real-time search and analysis, alerting, dashboards, and more. Scalability, flexibility, user-friendly interface, and strong community support
  • 8. Understand ing TCP and Netflow Logs Netflow Logs: NetFlow is a network protocol developed by Cisco for collecting and monitoring IP traffic data. It helps network administrators analyze traffic patterns, monitor performance, and troubleshoot issues. • Key Components: • NetFlow Exporter: Collects and exports flow data. • NetFlow Collector: Receives and stores flow data. • NetFlow Analyzer: Analyzes and visualizes the data. • NetFlow Versions: • NetFlow v5: Widely used, standard version. • NetFlow v9: Template-based, more flexible and extensible.
  • 9. Understand ing TCP and Netflow Logs • Here are the most important fields: • Source IP Address: The IP address of the device that sent the packets. • Destination IP Address: The IP address of the device that received the packets. • Source Port: The port number on the source device. • Destination Port: The port number on the destination device. • Layer 3 Protocol Type: The type of protocol used (e.g., TCP, UDP). • Type of Service (ToS): Quality of service information. • Input Interface: The network interface that received the packets. • Output Interface: The network interface that sent the packets. • Packet Count: The number of packets in the flow. • Byte Count: The total number of bytes in the flow. • Flow Start Timestamp: The time when the flow started. • Flow End Timestamp: The time when the flow ended. • Next Hop IP Address: The IP address of the next hop router. • Source AS (Autonomous System): The AS number of the source device. • Destination AS: The AS number of the destination device.
  • 10. Understand ing TCP and Netflow Logs TCP Logs: TCP logs capture detailed information about TCP connections and their states. These logs help network administrators monitor traffic, diagnose issues, and ensure reliable network communication. • Common TCP Flags: • SYN (Synchronize): Initiates a connection. • ACK (Acknowledgment): Acknowledges received data. • FIN (Finish): Indicates the sender is finished sending data. • RST (Reset): Abruptly terminates a connection. • PSH (Push): Indicates that data should be pushed to the receiving application. • URG (Urgent): Indicates that urgent data is being sent.
  • 11. Understand ing TCP and Netflow Logs 1.Source IP Address: The IP address of the device that initiated the connection. 2.Destination IP Address: The IP address of the device that received the connection request. 3.Source Port: The port number on the source device. 4.Destination Port: The port number on the destination device. 5.Timestamp: The date and time when the log entry was recorded. 6.TCP Flags: Indicators of the state of the TCP connection, such as SYN, ACK, FIN, and RST. 7.Sequence Numbers: Used to ensure data is transmitted and received in the correct order. 8.Acknowledgment Numbers: Confirm receipt of packets. 9.Window Size: Indicates the amount of data that can be sent before receiving an acknowledgment. 10.Connection State: Describes the current state of the TCP connection (e.g., established, closed).
  • 12. Setting Up Graylog for TCP and Netflow Logs • System Requirements: • Hardware and software requirements for installing Graylog. • Installation Steps: • Installing prerequisites (Java, MongoDB, Elasticsearch). • Installing Graylog. • Configuration: • Basic configuration steps for Graylog. • Setting up inputs for TCP and Netflow logs. https://go2docs.graylog.org/current/downloading _and_installing_graylog/installing_graylog.html
  • 13. Collecti ng and Processi ng Logs Configuring Inputs: Inputs in Graylog are used to receive log messages from various sources. Configuring inputs is the first step in collecting and analyzing log data. 1. Accessing Inputs • Navigate to the Graylog web interface. • Go to System > Inputs. 2. Selecting Input Type • Click on Select input. • Choose the type of input based on the log source (e.g., Syslog, NetFlow UDP). 3. Configuring Input Details • Fill in the necessary details: • Title: Name of the input. • Port: The port on which Graylog will listen for incoming messages. • Bind Address: The IP address to bind the input to. • Additional Parameters: Depending on the input type, additional configurations may be required. 4. Starting the Input • Click Launch new input to start the input. • Verify that the input is running and receiving messages.
  • 14. Collecting and Processing Logs • Example: Configuring a Syslog UDP Input • Title: Syslog UDP • Port: 514 • Bind Address: 0.0.0.0 (all network interfaces) • Save and launch the input.
  • 15. Collecti ng and Processi ng Logs Log Parsing: Log Parsing is the process of analyzing and extracting meaningful data from log files. It involves converting raw log data into structured information for easier analysis and monitoring. 1. Creating Extractors in Graylog • Navigate to System > Inputs. • Select the input you want to add an extractor to. • Click on Manage Extractors. 2. Defining an Extractor • Choose an extractor type (e.g., GROK, JSON, Regex). • Define the parsing rule to extract fields from log messages. • Test the extractor with sample log data to ensure accuracy. 3. Saving and Using Extractors • Save the extractor. • Graylog will apply the extractor to incoming log messages on the selected input. • Extracted fields will be available for searching and analysis.
  • 16. Collecting and Processing Logs prerouting: in:<pppoe-ram-ruhul@v> out:(unknown 0), connection-state:established,snat proto TCP (ACK,FIN), 10.64.4.28:55842- >23.212.164.120:443, NAT (10.64.4.28:55842- >103.234.202.0:55842)->23.212.164.120:443 grok_pattern: NAT (%{IP:internal_ip}:%{NUMBER:internal_port}- >%{IP:nat_ip}:%{NUMBER:nat_port})- >%{IP:destination_ip}:%{NUMBER:destination_port }, len %{NUMBER:length}
  • 17. Collecti ng and Processi ng Logs Log Storage and Retention: 1. Setting Up Log Storage • Use Elasticsearch as the primary storage backend for Graylog. • Ensure Elasticsearch is configured for high availability and scalability. 2. Configuring Retention Policies in Graylog • Navigate to System > Indices. • Define retention policies based on index sets. • Options include: • Time-based retention: Retain logs for a specified period. • Size-based retention: Retain logs until a certain index size is reached. • Combined retention: Use both time and size-based retention. 3. Implementing Log Rotation • Configure index rotation strategies: • Time-based rotation: Rotate indices daily, weekly, etc. • Size-based rotation: Rotate indices when they reach a specific size. 4. Monitoring Storage and Retention • Use Graylog's built-in monitoring tools to track storage usage and retention compliance. • Set up alerts for when storage limits are approaching.
  • 18. Collecting and Processing Logs Log Storage and Retention: Example: Rotate indices daily and retain logs for 30 days.
  • 19. Analyzin g Logs with Graylog Search and Filter: • Search: The ability to query log data to find specific information. • Filter: Narrowing down search results to show only relevant log entries. • Accessing the Search Interface, Navigate to the Graylog web interface. Click on Search in the top menu. • Performing a Basic Search • Enter keywords in the search bar. • Use common fields like message, source, and timestamp • Using Time Range Filters • Select a predefined time range (e.g., last 5 minutes, last 24 hours). • Customize the time range using the date and time picker.
  • 20. Analyzing Logs with Graylog • Example: • Filter by log level: level:ERROR • Filter by IP address: source_ip:192.168.1.1 • Search for login failures: message:login AND message:failed • Filter by user or IP address: user:admin
  • 21. Analyzing Logs with Graylog Creating Dashboards: 1. Accessing the Dashboard Interface • Navigate to the Graylog web interface. • Click on Dashboards in the top menu. 2. Creating a New Dashboard • Click on Create new dashboard. • Provide a name and description for the dashboard.
  • 23. Analyzing Logs with Graylog Alerting and Notifications: Automated triggers for specific events or conditions is possible and also notification of those alert via Email/API/Slack is support. Some features are only supported by Graylog Enterprise Edition.
  • 24. Share Dashboard with others • Add Users/Teams: Enter the usernames or teams you want to share the dashboard with. • Assign Roles: • Viewer: Can view the dashboard. • Editor: Can edit the dashboard. • Owner: Full control over the dashboard, including sharing settings.
  • 25. Use Cases and Examples [TCP flow Dashboard]
  • 26. Use Cases and Examples [TCP flow Dashboard]
  • 27. Use Cases and Examples [Netflow Dashboard]
  • 28. Use Cases and Examples [Grafana Dashboard]
  • 30. Best Practices and Tips Security Considerations: • Ensuring secure log transmission and storage. Performance Optimization: • Tips for optimizing Graylog performance. Community and Support: • Leveraging the Graylog community for support and collaboration.