Skip to main content

Visualize and Analyze Veeam Syslog Data in Graylog

  • November 18, 2024
  • 5 comments
  • 508 views

SteveHeart
Forum|alt.badge.img+11

I want to introduce you to another community project I worked on: The Veeam Data Platform Content Pack for Graylog. Graylog is a Security Information and Event Management (SIEM) solution that enables the efficient collection, search, analysis, and alerting of various types of machine-generated data. More details about their products can be found on the official website.

Content Pack Description

The first version of the Content Pack enables the visualization of security-relevant events transmitted by Veeam Backup & Replication via Syslog. In addition to a pre-configured Dashboard, further information is extracted from the Syslog data, which allows the ingested data to be analyzed further. For more details about the Content Pack, see README.md on GitHub.

Download & Install the Content Pack

The following steps describe how to download and install the Content Pack.

Download

Download the Content Pack from GitHub

Graylog Upload & Installation

After downloading, log in to the Graylog web console and perform the following steps:

  1. Select Content Packs in the System Menu

     

  2. Click on the Upload button

     

  3. Click on Choose File and select the previously downloaded JSON file. Next, click on the Upload button

     

  4. The content pack is displayed in the list of available content packs. Click on the Veeam Data Platform Content Pack
     
  5. Click on the Actions drop-down menu and select Install

     

  6. Enter a Comment and the desired Syslog Port in the corresponding fields and then click the Install button

VBR Syslog Settings

Next, the Graylog server must be configured with the corresponding port in the Event Forwarding settings of Veeam Backup & Replication, as documented here.

 

Visualization & Search

Veeam Security Dashboard

The Veeam Security Dashboard will display values once security-relevant Syslog data has been transmitted.

The dashboard contains the following widgets:

  • Veeam Backup & Replication Security Events
    A pie chart with the percentage breakdown of incoming messages by severity level
  • All Security Activities
    All security-relevant activities during the past 24 hours
  • Marked as infected
    The total amount of objects that were marked as Infected during the past 24 hours
  • Four-Eyes Authorization Events
    The total amount of four-eyes authorization events
  • Marked as Suspicious
    The total amount of objects that were marked as Suspicious during the past 24 hours
  • Critical and High Severity Events
    Tabular view of events with the severity Critical or High

Searching Logs

You can also search for other events on the Graylog search page. Enter a search query in the search bar and adjust the time range for your search if necessary. The example below shows how to search for all completed backup jobs with the status “Failed” during the last 7 days.

instanceId:190 AND JobResult:2

Notes

Please provide feedback. Depending on your feedback, I will try to add enhancements in my free time.

 

5 comments

SteveHeart
Forum|alt.badge.img+11
  • Author
  • Influencer
  • November 13, 2025

A problem with Graylog 7.0.0 has been reported. An updated content pack is now available in my GitHub Repository.


jorge.delacruz
Forum|alt.badge.img+8
  • Community Manager
  • November 14, 2025

Top work, love it!


  • New Here
  • November 27, 2025

Hello. I’m on a veeam B&R 12.3... and a graylog 6.3 and I have nothing on the widget “Critical and High Severity Events”. In the serach i have criticaly: Critical OR criticaly: High. But criticaly is unknown.

 

Do you know what I should replace "criticality" with?

 

Thanks.

 

 


SteveHeart
Forum|alt.badge.img+11
  • Author
  • Influencer
  • November 27, 2025

Hey ​@SuuportResa 
Did you connect the Stream to the Pipeline? Because this is tagging the events with the severities.

Cheers,
Steve


  • New Here
  • November 27, 2025

Hey ​@SuuportResa 
Did you connect the Stream to the Pipeline? Because this is tagging the events with the severities.

Cheers,
Steve

Oh no !

thanks for your helpful !

I will show the result tomorrow.