Choose a language
By Graylog
How would you rate your experience with Graylog?
Activity Monitoring
Based on 48 Graylog reviews and verified by the G2 Product R&D team.
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Asset Management
41 reviewers of Graylog have provided feedback on this feature.
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
Based on 56 Graylog reviews and verified by the G2 Product R&D team.
Provides security information and stores the data in a secure repository for reference.
Event Management
As reported in 50 Graylog reviews.
Alerts users of incidents and allows users to intervene manually or triggers an automated response.
Automated Response
As reported in 41 Graylog reviews.
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reporting
Based on 46 Graylog reviews and verified by the G2 Product R&D team.
Documents cases of abnormal activity and compromised systems.
Threat Intelligence
Based on 46 Graylog reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
Based on 41 Graylog reviews and verified by the G2 Product R&D team.
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Advanced Analytics
Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
Based on 49 Graylog reviews and verified by the G2 Product R&D team.
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Dashboards and Visualizations
Presents information and analytics in a digestible, intuitive, and visually appealing way.
Alerts and Notifications
Clearly notifies users with relevant information and anomalies in a timely manner.
Reporting
Creates reports outlining log activity and relevant metrics.
Automation
Automatically allocates resources to address log anomalies.
Performance Baseline
Sets a standard performance baseline by which to compare log activity.
Real-Time Monitoring
Constantly monitors logs to detect anomalies in real time.
Data Sources
Based on 10 Graylog reviews and verified by the G2 Product R&D team.
Automatically collect logs from all your services, applications, and platforms
Indexing
Automate the indexing of machine data that's critical to your operations
Automated Tagging
See log data in context with automated tagging and correlation
Data Blending
Mix and match data from apps, hosts, containers, services, networks, and more
Track Trends
Allows user to track log trends.
Detect Anomalies
Identify and predict anomalies in real-time with outlier detection and uncover root-causes
Metric and Event Data
Analyze both metric and event data on the same platform regardless of source or structure
Search
Based on 11 Graylog reviews and verified by the G2 Product R&D team.
Search your logs for troubleshooting and open-ended exploration of your data
Alerts
Create alerts based on search patterns, thresholds for specific log metrics, or other conditions
Live Tail
See your data, in real time, streaming into the system from multiple data sources
Dashboards
Visualize log data on dashboards
Data Discovery
Drill down and explore data to discover new insights
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Decision Making
Makes informed choices based on available data and objectives
Natural Language Interaction
Engages in human-like conversation for task delegation