Beginner Free

Open Source Log Management Home-Lab using Graylog

Build a complete centralized log management system using Graylog on Docker to collect, store, and analyze logs from an Ubuntu syslog client.

Self-Paced by Jaimin Pathak

Overview

In this project, you will set up a centralized log management environment using Graylog running in Docker containers.
You’ll configure an Ubuntu Server as a syslog client to send system logs to Graylog for ingestion and analysis.
The lab demonstrates how organizations collect and visualize logs from multiple sources in one dashboard.
You’ll use Docker Compose to deploy Graylog, Elasticsearch, and MongoDB, then configure inputs, streams, and dashboards.
Finally, you’ll validate that Ubuntu’s syslog messages appear in Graylog and create filters to organize them.

What You'll Learn

  • Deploying Graylog Stack

    Learn how to set up Graylog with Docker, including its dependencies MongoDB and OpenSearch/Elasticsearch.

  • Syslog Integration

    Configure an Ubuntu system to forward logs securely to Graylog over UDP/TCP.

  • Data Visualization & Search

    Explore Graylog dashboards, create streams, and perform real-time log analysis.

  • Security & Access Control

    Secure the setup using user roles, input restrictions, and controlled access.

About Trainer

Jaimin Pathak

Jaimin Pathak

Jaimin Pathak is a dynamic cybersecurity leader with deep expertise in Blue Team operations, digital forensics, and threat intelligence. As the Head of Security at HaxSecurity, Jaimin brings a hands-on approach to building and scaling modern Security Operations Centers (SOC). His career spans years of dedicated work in incident response, SIEM engineering, and proactive threat hunting. Jaimin is also a passionate mentor and educator, having guided thousands of cybersecurity learners through practical training programs, shaping the next generation of defenders in the field.

Related Projects

Practical AWS Cloud Security Posture Assessment Using Scout Suite
Free Beginner

Practical AWS Cloud Security Posture Assessment Using Scout Suite

Identify real-world AWS attack surfaces through visual security posture analysis.

Wazuh + n8n +  Anyrun: Automated Malware Analysis
Pro Intermediate

Wazuh + n8n + Anyrun: Automated Malware Analysis

Automate malware analysis by sending Wazuh-detected suspicious files into ANY.RUN, retrieving detailed reports and IOCs, and integrating results back into your SOC workflow.

Threat Hunting Home-Lab(using Velociraptor)
Pro Beginner

Threat Hunting Home-Lab(using Velociraptor)

Deploy, Configure, and Hunt Threats with Velociraptor Forensics Platform