Open Source Log Management Home-Lab using Graylog
Build a complete centralized log management system using Graylog on Docker to collect, store, and analyze logs from an Ubuntu syslog client.
Overview
In this project, you will set up a centralized log management environment using Graylog running in Docker containers.
You’ll configure an Ubuntu Server as a syslog client to send system logs to Graylog for ingestion and analysis.
The lab demonstrates how organizations collect and visualize logs from multiple sources in one dashboard.
You’ll use Docker Compose to deploy Graylog, Elasticsearch, and MongoDB, then configure inputs, streams, and dashboards.
Finally, you’ll validate that Ubuntu’s syslog messages appear in Graylog and create filters to organize them.
What You'll Learn
-
Deploying Graylog Stack
Learn how to set up Graylog with Docker, including its dependencies MongoDB and OpenSearch/Elasticsearch.
-
Syslog Integration
Configure an Ubuntu system to forward logs securely to Graylog over UDP/TCP.
-
Data Visualization & Search
Explore Graylog dashboards, create streams, and perform real-time log analysis.
-
Security & Access Control
Secure the setup using user roles, input restrictions, and controlled access.
About Trainer
Jaimin Pathak
Jaimin Pathak is a dynamic cybersecurity leader with deep expertise in Blue Team operations, digital forensics, and threat intelligence. As the Head of Security at HaxSecurity, Jaimin brings a hands-on approach to building and scaling modern Security Operations Centers (SOC). His career spans years of dedicated work in incident response, SIEM engineering, and proactive threat hunting. Jaimin is also a passionate mentor and educator, having guided thousands of cybersecurity learners through practical training programs, shaping the next generation of defenders in the field.
Related Projects
Practical AWS Cloud Security Posture Assessment Using Scout Suite
Identify real-world AWS attack surfaces through visual security posture analysis.
Wazuh + n8n + Anyrun: Automated Malware Analysis
Automate malware analysis by sending Wazuh-detected suspicious files into ANY.RUN, retrieving detailed reports and IOCs, and integrating results back into your SOC workflow.
Threat Hunting Home-Lab(using Velociraptor)
Deploy, Configure, and Hunt Threats with Velociraptor Forensics Platform