Answer the question
In order to leave comments, you need to log in
How to connect cisco logging to Logstash?
I am new to logstash. Raised the stack Logstash + Elasticsearch + Kibana
there is a config
[email protected]:~# cat /etc/logstash/conf.d/10-syslog.conf
input {
tcp {
port => 514
type => syslog
}
udp {
port => 514
type => syslog
}
}
filter {
if [type] == "syslog" {
grok {
match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?: \[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
add_field => [ "received_at", "%{ @timestamp }" ]
add_field =>
}
syslog_pri { }
date
{
match => [ "syslog_timestamp", "MMM d HH:mm:ss", "MMM dd HH:mm:
ss
"
]
}
}
} Kibana
Answer the question
In order to leave comments, you need to log in
There can be many reasons - starting with the fact that output - elasticsearch is not specified in the config, ending with the fact that es cannot parse some field (timestamp, for example).
Well, it would be nice to make sure that the syslog reaches the server :)
In any case, you must first enable logstash and elasticsearch logging and try to debug the filter with output stdout, for example.
+ look at grokdebug.herokuapp.com
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question