Skip to content

Commit f9a64ef

Browse files
Merge pull request #225122 from pritamso/Broken-link-fix-harshacs
Broken link fixed
2 parents 28befff + 354651b commit f9a64ef

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,13 @@ enabling network security group flow logs, refer to the following article [Intr
4040

4141
In this example, both Graylog and Logstash are configured on an Ubuntu 14.04 Server, deployed in Azure.
4242

43-
- Refer to the [documentation](https://docs.graylog.org/en/2.2/pages/installation/os/ubuntu.html) from Graylog, for step by step instructions on how install onto Ubuntu.
44-
- Make sure to also configure the Graylog web interface by following the [documentation](https://docs.graylog.org/en/2.2/pages/configuration/web_interface.html#configuring-webif).
43+
- Refer to the [documentation](https://go2docs.graylog.org/5-0/downloading_and_installing_graylog/ubuntu_installation.html) from Graylog, for step by step instructions on how install onto Ubuntu.
44+
- Make sure to also configure the Graylog web interface by following the [documentation](https://archivedocs.graylog.org/en/3.2/pages/configuration/web_interface.html).
4545

46-
This example uses the minimum Graylog setup (i.e a single instance of a Graylog), but Graylog can be architected to scale across resources depending on your system and production needs. For more information on architectural considerations or a deep architectural guide, see Graylog’s [documentation](https://docs.graylog.org/en/2.2/pages/architecture.html) and [architectural guide](https://www.slideshare.net/Graylog/graylog-engineering-design-your-architecture).
46+
This example uses the minimum Graylog setup (i.e a single instance of a Graylog), but Graylog can be architected to scale across resources depending on your system and production needs. For more information on architectural considerations or a deep architectural guide, see Graylog’s [documentation](https://archivedocs.graylog.org/en/3.2/pages/architecture.html) and [architectural guide](https://www.slideshare.net/Graylog/graylog-engineering-design-your-architecture).
4747

4848
Graylog can be installed in many ways, depending on your platform and preferences. For a full list of possible installation methods, refer to Graylog's official
49-
[documentation](https://docs.graylog.org/en/2.2/pages/installation.html). The Graylog server application runs on Linux distributions and has the following
49+
[documentation](https://archivedocs.graylog.org/en/3.2/pages/sidecar.html#installation). The Graylog server application runs on Linux distributions and has the following
5050
prerequisites:
5151

5252
- Java SE 8 or later – [JDK installation documentation](/azure/developer/java/fundamentals/java-jdk-install)
@@ -179,7 +179,7 @@ Now that you have established a connection to the flow logs using Logstash and s
179179

180180
![Getting started](./media/network-watcher-analyze-nsg-flow-logs-graylog/getting-started.png)
181181

182-
3. To launch the new input, select *GELF UDP* in the **Select input** drop-down, and then fill out the form. GELF stands for Graylog Extended Log Format. The GELF format is developed by Graylog. To learn more about its advantages, see the Graylog [documentation](https://docs.graylog.org/en/2.2/pages/gelf.html).
182+
3. To launch the new input, select *GELF UDP* in the **Select input** drop-down, and then fill out the form. GELF stands for Graylog Extended Log Format. The GELF format is developed by Graylog. To learn more about its advantages, see the Graylog [documentation](https://archivedocs.graylog.org/en/3.2/pages/gelf.html).
183183

184184
Make sure to bind the input to the IP you configured your Graylog server on. The IP address should match the **host** field of the UDP output of the Logstash configuration file. The default port should be *12201*. Ensure the port matches the **port** field in the UDP output designated in the Logstash config file.
185185

@@ -189,7 +189,7 @@ Now that you have established a connection to the flow logs using Logstash and s
189189

190190
![Screenshot that shows the Local inputs section that contains the input you launched.](./media/network-watcher-analyze-nsg-flow-logs-graylog/local-inputs.png)
191191

192-
To learn more about Graylog message inputs, refer to the [documentation](https://docs.graylog.org/en/2.2/pages/sending_data.html#what-are-graylog-message-inputs).
192+
To learn more about Graylog message inputs, refer to the [documentation](https://archivedocs.graylog.org/en/3.2/pages/sending_data.html#what-are-graylog-message-inputs).
193193

194194
4. Once these configurations have been made, you can start Logstash to begin reading in flow logs with the following command: `sudo systemctl start logstash.service`.
195195

@@ -203,7 +203,7 @@ Clicking on the blue “%{Message}” link expands each message to show the para
203203

204204
![Screenshot shows message detail from the Graylog server.](./media/network-watcher-analyze-nsg-flow-logs-graylog/messages.png)
205205

206-
By default, all message fields are included in the search if you don’t select a specific message field to search for. If you want to search for specific messages (i.e – flow tuples from a specific source IP) you can use the Graylog search query language as [documented](https://docs.graylog.org/en/2.2/pages/queries.html)
206+
By default, all message fields are included in the search if you don’t select a specific message field to search for. If you want to search for specific messages (i.e – flow tuples from a specific source IP) you can use the Graylog search query language as [documented](https://archivedocs.graylog.org/en/3.2/pages/queries.html)
207207

208208
## Analyze network security group flow logs using Graylog
209209

@@ -240,12 +240,12 @@ the dashboard are **Quick Values** charts, which display a list of values of the
240240

241241
![Flowlogs dashboard](./media/network-watcher-analyze-nsg-flow-logs-graylog/flowlogs-dashboard.png)
242242

243-
For further explanation on dashboards and the other types of widgets, refer to Graylog’s [documentation](https://docs.graylog.org/en/2.2/pages/dashboards.html).
243+
For further explanation on dashboards and the other types of widgets, refer to Graylog’s [documentation](https://archivedocs.graylog.org/en/3.2/pages/dashboards.html).
244244

245245
By integrating Network Watcher with Graylog, you now have a convenient and centralized way to manage and visualize network security group flow logs. Graylog has a number of other powerful features such as streams and alerts that can also be used to further manage flow logs and better understand your network traffic. Now that
246246
you have Graylog set up and connected to Azure, feel free to continue to explore the other functionality that it offers.
247247

248248
## Next steps
249249

250250
Learn how to visualize your network security group flow logs with Power BI by visiting [Visualize network security group flows logs with Power
251-
BI](network-watcher-visualize-nsg-flow-logs-power-bi.md).
251+
BI](network-watcher-visualize-nsg-flow-logs-power-bi.md).

0 commit comments

Comments
 (0)