Graylog Scenario

SCENARIO INFORMATION

DESCRIPTION:

This scenario serves as a guide on how to install and configure GrayLog open-source tool to perform log management and analysis.

This scenario uses 1 virtual machine.

OBJECTIVES AND OUTCOME:

After completing this scenario you will be able to:

– Install and configure Graylog.
– Install Graylog dependencies and configuring them.
– Launch input with Graylog.

PRE-REQUISITES”

In order to get the full benefit from this scenario, it is suggested that you have competencies in the following areas:

– Basic knowledge in Linux operating systems.

RECOMMENDED READING:

There are no recommended readings for this scenario.

AUTHOR:

This scenario was created by Mercy Mwikali.

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY EASY
TIME 1 HOUR

Start Scenario

RegisterLogin

Other Scenarios

Facebook
Twitter
LinkedIn
Reddit
WhatsApp
Telegram
Scroll to Top

Upcoming Webinar Events

Join CYBER RANGES and guests on live Webinars and Bootcamps

Sign up to learn skills and practise on the CYBER RANGES platform