Heeyy
I’m new in here.
Soo we just got our Graylog server up and running last month.
And the logdata is just flying in.
So my issue is that i’m getting abit to much logdata.
We have only gotten the 10Gb license.
And for just our 3 domain controlleres, i’m getting 10 - 11 GB logs each day.
So i’m looking for at way to maybe get that around 9GB or below that.
So i’m hoping that there are some smart people in here.
Right now i have 3 inputs.
1 for each DC
input 1 29GB
input 2 15GB
input 3 20GB
All 3 is set up using GELF TCP.
And thanks to the Illuminate, i have a single stream where all the data basically is going to.
Windows Security Event Log Messages.
happy to help but since you are a paying customer, Graylog Support prefers you to go to them.
If you were only using opensource, I would ask more information about how you are using GELF to send in logs from the windows machines (not beats or nxlog?) and suggest either dropping message at whatever collector you are using at the DC’s or secondarily you could use Graylog rules in the pipeline to drop message (less efficient)
Still, it is better to work with Graylog support so that you continue to get information that Illuminate requires - all that is beyond the bounds of OpenSource.
We (the OpenSource community) were talking about support at the recent Graylog Go conference and it was suggested that paying customers wouldn’t need to use the OpenSource Forums
I refer to @gsmith for all NXLog tuning since he knows that better than I, on the other hand, I have a bunch of windows machines (using winlogbeat) that I have tuned out some of the rifraff that comes in … an example (in beats format) below.
Best to work with Graylog Support - while I may not be interested in some reoccurring events, it may break parts of your illuminate to prematurely drop them.