You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,13 +40,13 @@ enabling network security group flow logs, refer to the following article [Intr
40
40
41
41
In this example, both Graylog and Logstash are configured on an Ubuntu 14.04 Server, deployed in Azure.
42
42
43
-
- Refer to the [documentation](https://docs.graylog.org/en/2.2/pages/installation/os/ubuntu.html) from Graylog, for step by step instructions on how install onto Ubuntu.
44
-
- Make sure to also configure the Graylog web interface by following the [documentation](https://docs.graylog.org/en/2.2/pages/configuration/web_interface.html#configuring-webif).
43
+
- Refer to the [documentation](https://go2docs.graylog.org/5-0/downloading_and_installing_graylog/ubuntu_installation.html) from Graylog, for step by step instructions on how install onto Ubuntu.
44
+
- Make sure to also configure the Graylog web interface by following the [documentation](https://archivedocs.graylog.org/en/3.2/pages/configuration/web_interface.html).
45
45
46
-
This example uses the minimum Graylog setup (i.e a single instance of a Graylog), but Graylog can be architected to scale across resources depending on your system and production needs. For more information on architectural considerations or a deep architectural guide, see Graylog’s [documentation](https://docs.graylog.org/en/2.2/pages/architecture.html) and [architectural guide](https://www.slideshare.net/Graylog/graylog-engineering-design-your-architecture).
46
+
This example uses the minimum Graylog setup (i.e a single instance of a Graylog), but Graylog can be architected to scale across resources depending on your system and production needs. For more information on architectural considerations or a deep architectural guide, see Graylog’s [documentation](https://archivedocs.graylog.org/en/3.2/pages/architecture.html) and [architectural guide](https://www.slideshare.net/Graylog/graylog-engineering-design-your-architecture).
47
47
48
48
Graylog can be installed in many ways, depending on your platform and preferences. For a full list of possible installation methods, refer to Graylog's official
49
-
[documentation](https://docs.graylog.org/en/2.2/pages/installation.html). The Graylog server application runs on Linux distributions and has the following
49
+
[documentation](https://archivedocs.graylog.org/en/3.2/pages/sidecar.html#installation). The Graylog server application runs on Linux distributions and has the following
50
50
prerequisites:
51
51
52
52
- Java SE 8 or later – [JDK installation documentation](/azure/developer/java/fundamentals/java-jdk-install)
@@ -179,7 +179,7 @@ Now that you have established a connection to the flow logs using Logstash and s
3. To launch the new input, select *GELF UDP* in the **Select input** drop-down, and then fill out the form. GELF stands for Graylog Extended Log Format. The GELF format is developed by Graylog. To learn more about its advantages, see the Graylog [documentation](https://docs.graylog.org/en/2.2/pages/gelf.html).
182
+
3. To launch the new input, select *GELF UDP* in the **Select input** drop-down, and then fill out the form. GELF stands for Graylog Extended Log Format. The GELF format is developed by Graylog. To learn more about its advantages, see the Graylog [documentation](https://archivedocs.graylog.org/en/3.2/pages/gelf.html).
183
183
184
184
Make sure to bind the input to the IP you configured your Graylog server on. The IP address should match the **host** field of the UDP output of the Logstash configuration file. The default port should be *12201*. Ensure the port matches the **port** field in the UDP output designated in the Logstash config file.
185
185
@@ -189,7 +189,7 @@ Now that you have established a connection to the flow logs using Logstash and s
189
189
190
190

191
191
192
-
To learn more about Graylog message inputs, refer to the [documentation](https://docs.graylog.org/en/2.2/pages/sending_data.html#what-are-graylog-message-inputs).
192
+
To learn more about Graylog message inputs, refer to the [documentation](https://archivedocs.graylog.org/en/3.2/pages/sending_data.html#what-are-graylog-message-inputs).
193
193
194
194
4. Once these configurations have been made, you can start Logstash to begin reading in flow logs with the following command: `sudo systemctl start logstash.service`.
195
195
@@ -203,7 +203,7 @@ Clicking on the blue “%{Message}” link expands each message to show the para
203
203
204
204

205
205
206
-
By default, all message fields are included in the search if you don’t select a specific message field to search for. If you want to search for specific messages (i.e – flow tuples from a specific source IP) you can use the Graylog search query language as [documented](https://docs.graylog.org/en/2.2/pages/queries.html)
206
+
By default, all message fields are included in the search if you don’t select a specific message field to search for. If you want to search for specific messages (i.e – flow tuples from a specific source IP) you can use the Graylog search query language as [documented](https://archivedocs.graylog.org/en/3.2/pages/queries.html)
207
207
208
208
## Analyze network security group flow logs using Graylog
209
209
@@ -240,12 +240,12 @@ the dashboard are **Quick Values** charts, which display a list of values of the
For further explanation on dashboards and the other types of widgets, refer to Graylog’s [documentation](https://docs.graylog.org/en/2.2/pages/dashboards.html).
243
+
For further explanation on dashboards and the other types of widgets, refer to Graylog’s [documentation](https://archivedocs.graylog.org/en/3.2/pages/dashboards.html).
244
244
245
245
By integrating Network Watcher with Graylog, you now have a convenient and centralized way to manage and visualize network security group flow logs. Graylog has a number of other powerful features such as streams and alerts that can also be used to further manage flow logs and better understand your network traffic. Now that
246
246
you have Graylog set up and connected to Azure, feel free to continue to explore the other functionality that it offers.
247
247
248
248
## Next steps
249
249
250
250
Learn how to visualize your network security group flow logs with Power BI by visiting [Visualize network security group flows logs with Power
0 commit comments