We published the last version of Graylog Documentation before the release of Graylog 4.2. Now, all documentation and help content for Graylog products are available at https://docs.graylog.org/.
There will be no further updates to these pages as of October 2021.
Do you have questions about our documentation? You may place comments or start discussions about documentation here: https://community.graylog.org/c/documentation-campfire/30
Download & Install Graylog¶
Graylog can be deployed in many different ways, You should download whatever works best for you. For those who would like to do an initial lab evaluation of Graylog, we recommend starting with the virtual machine appliances.
Virtual Appliances are definitely the fastest way to get started. However, since the virtual appliances are generally not suitable for use in production, they should be used strictly for proof of concept, evaluations or lab environments.
The virtual appliances are also completely unsecured. No hardening has been done and all default services are enabled.
For production deployments users should select and deploy one of the other, more flexible, installation methods.
Operating System Packages¶
Graylog may be installed on the following operating systems.
Most customers use package tools like DEB or RPM to install the Graylog software. Details are included in the section, Operating System Packages.
Customers who prefer to deploy graylog via configuration management tools may do so. Graylog currently supports Chef, Puppet, Ansible.
Graylog supports Docker for deployment of Graylog, MongoDB and Elasticsearch. Installation and configuration instructions may be found on the Docker installation page.
Supported Virtual Appliances
Deployment guide for Virtual Machine Appliances.
Deployment guide for Amazon Web Services.
Virtual Appliance Caveats¶
Virtual appliances are not suitable for production deployment out of the box. They do not have sufficient storage, nor do they offer capabilities like index replication that meet high availability requirements.
The virtual appliances are not hardened or otherwise secured. Use at your own risk and apply all security measures required by your organization.