Graylog<p>Let's take a look at extracting data from <a href="https://infosec.exchange/tags/Graylog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Graylog</span></a>. Follow along as Tony Reinke shows you step-by-step how to transform your raw data from unstructured to structured.</p><p>We can find logs with raw text searches, but to gain insights in to the data we need to extract the different fields and their values, which will in turn make search easier and assist you in the creation of dashboards and alerts. 👍 </p><p>Ready to dive in? 🪂 </p><p><a href="https://medium.com/@coachreinke/graylog-extracting-data-5733a8416c81" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@coachreinke/graylo</span><span class="invisible">g-extracting-data-5733a8416c81</span></a> <a href="https://infosec.exchange/tags/logmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logmanagement</span></a> <a href="https://infosec.exchange/tags/loganalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>loganalysis</span></a> <a href="https://infosec.exchange/tags/logdata" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logdata</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>