Hi ,
I’m trying to send logs from a Windows Server 2022 (using NXLog CE) to a Graylog server (Debian 11, Graylog v6.0) using both GELF TCP and GELF UDP.
Setup:
- Graylog is up and running
- Inputs are active (GELF TCP and GELF UDP) on various ports (tested with
12201
,5555
,79
, and80
) - NXLog is installed on the Windows host and the service starts correctly
- Event logs are generated using
eventcreate
on Windows - NXLog config is based on official examples. Example output block:
<Output out>
Module om_tcp
Host 10.X.X.X
5555
OutputType GELF
</Output>
- Also tested with PowerShell GELF message scripts (TCP and UDP) – no messages appear in Graylog
What I’ve confirmed so far:
Ping from Windows to Graylog server works
Test-NetConnection -Port
to Graylog ports (e.g. 12201, 5555) failsPowerShell UDP message test: no results in Graylog
GELF Inputs are green and marked as RUNNING in Graylog UI
When sending test messages locally on the Graylog server using `, messages do appear in Graylog
ss -tulpen
confirms Graylog is listening on the correct portsGraylog
server.log
shows nothing when sending from Windowsiptables -L
shows default policy ACCEPT, but chains includeufw-*
rules
Additional info:
- No local firewalls are enabled on either side
- I’m not managing the underlying network infrastructure
- I suspect there’s a switch/router/firewall in between silently dropping TCP/UDP traffic to these ports
- I don’t see any logs of blocked packets in
/var/log/syslog
(even usinggrep UFW
orDROP
) - I haven’t added custom iptables logging rules yet, but can if needed
My question:
Is there any other way I can confirm whether the Graylog server is silently dropping/ignoring incoming TCP/UDP traffic – even though the input is active and listening?
Or is there any tool, trick, or log I can enable that will catch blocked or lost traffic, especially when the input logs remain silent?
Any ideas, tools, or directions would be greatly appreciated – I feel like I’ve tested almost everything.