Hello Friends,
A system administrator knows how much system logs can help to troubleshoot critical problems. And what if those logs are indexed at one place and can be visualized in charts etc. Fun, isn't it?
Let's see what can help us to set it up..
1. Nothing special to be done at Elasticsearch just run it by executing elasticsearch.bat from bin directory.
2. Prepare a config so that Logstash can read windows logs. We need to add config in input plugin.
This eventlog plugin helps logstash to read windows logs. Windows logs are stored in binary format and can be accessed using only Win32 API. This plugin takes several configuration options but all of those are optional. These config options are codec, add_field, logfile, interval, tags, type out of which we are using logfile and type.
a) type has no default value and used for filter activation. The given type is stored as part of event and we can search events in Kibana using this.
b) logfile is an array of String and contains Application, Security, System as default values in array. In the config we have used only System.
3. Store this config to a custom file in conf in Logstash with name logstash-windowslogs.conf
and run logstash using
where complete config file will be as -
4. We're done with configuration of Logstash. Next is to read this in kibana. Here is our config to connect Kibana to Elasticsearch to read indices.
5. As soon as we start Logstash, it will start collecting all the events and index them to elasticsearch. Now lets run Kibana by executing kibana.bat in bin directory.
6. Once Kibana is started, we can open its interface in browser using http://localhost:5601/. We need to configure index pattern. By default, it shows logstash-* in index name or pattern field and @timestamp in Time-Field name. Hit create by keeping defaults.
7. Now click Discover on the top menu to see the results. It will show histogram of counts of event.
All the results are also listed below histogram but for security reasons, I have not shown them here..
That's it. Pretty clean, what you say?
A system administrator knows how much system logs can help to troubleshoot critical problems. And what if those logs are indexed at one place and can be visualized in charts etc. Fun, isn't it?
Let's see what can help us to set it up..
1. Nothing special to be done at Elasticsearch just run it by executing elasticsearch.bat from bin directory.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
D:\Prep\ELK\elasticsearch-2.1.1>bin\elasticsearch.bat | |
[2016-01-23 15:06:38,555][WARN ][bootstrap ] unable to install syscall filter: syscall filtering not supported for OS: 'Windows 7' | |
[2016-01-23 15:06:39,281][INFO ][node ] [Wild Child] version[2.1.1], pid[17364], build[40e2c53/2015-12-15T13:05:55Z] | |
[2016-01-23 15:06:39,282][INFO ][node ] [Wild Child] initializing ... | |
[2016-01-23 15:06:39,592][INFO ][plugins ] [Wild Child] loaded [], sites [kopf] | |
[2016-01-23 15:06:39,641][INFO ][env ] [Wild Child] using [1] data paths, mounts [[New Volume (D:)]], net usable_space [71.4gb], net total_space [270.4gb] | |
, spins? [unknown], types [NTFS] | |
[2016-01-23 15:06:43,299][INFO ][node ] [Wild Child] initialized | |
[2016-01-23 15:06:43,299][INFO ][node ] [Wild Child] starting ... | |
[2016-01-23 15:06:44,750][INFO ][transport ] [Wild Child] publish_address {127.0.0.1:9300}, bound_addresses {127.0.0.1:9300}, {[::1]:9300} | |
[2016-01-23 15:06:44,761][INFO ][discovery ] [Wild Child] elasticsearch/NU9kgl8jQcuPJeiDLj4tMg | |
[2016-01-23 15:06:48,840][INFO ][cluster.service ] [Wild Child] new_master {Wild Child}{NU9kgl8jQcuPJeiDLj4tMg}{127.0.0.1}{127.0.0.1:9300}, reason: zen-disco-join(ele | |
cted_as_master, [0] joins received) | |
[2016-01-23 15:06:49,072][INFO ][gateway ] [Wild Child] recovered [0] indices into cluster_state | |
[2016-01-23 15:06:51,750][INFO ][http ] [Wild Child] publish_address {127.0.0.1:9200}, bound_addresses {127.0.0.1:9200}, {[::1]:9200} | |
[2016-01-23 15:06:51,751][INFO ][node ] [Wild Child] started |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
input { | |
eventlog { | |
type => 'Win32-EventLog' | |
logfile => 'System' | |
} | |
} |
a) type has no default value and used for filter activation. The given type is stored as part of event and we can search events in Kibana using this.
b) logfile is an array of String and contains Application, Security, System as default values in array. In the config we have used only System.
3. Store this config to a custom file in conf in Logstash with name logstash-windowslogs.conf
and run logstash using
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
>bin\logstash.bat -f conf\logstash-windowslogs.conf | |
io/console not supported; tty will not be manipulated | |
Settings: Default filter workers: 2 | |
Logstash startup completed |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
input { | |
eventlog{ | |
type => 'Win32-EventLog' | |
logfile => 'System' | |
} | |
} | |
output { | |
elasticsearch { | |
hosts => ["localhost:9200"] | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Kibana is served by a back end server. This controls which port to use. | |
server.port: 5601 | |
# The host to bind the server to. | |
server.host: "localhost" | |
# If you are running kibana behind a proxy, and want to mount it at a path, | |
# specify that path here. The basePath can't end in a slash. | |
# server.basePath: "" | |
# The Elasticsearch instance to use for all your queries. | |
elasticsearch.url: "http://localhost:9200" |
5. As soon as we start Logstash, it will start collecting all the events and index them to elasticsearch. Now lets run Kibana by executing kibana.bat in bin directory.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
>bin\kibana.bat | |
log [15:02:40.715] [info][status][plugin:kibana] Status changed from uninitialized to green - Ready | |
log [15:02:40.762] [info][status][plugin:elasticsearch] Status changed from uninitialized to green - Ready | |
log [15:02:40.784] [info][status][plugin:kbn_vislib_vis_types] Status changed from uninitialized to green - Ready | |
log [15:02:40.794] [info][status][plugin:markdown_vis] Status changed from uninitialized to green - Ready | |
log [15:02:40.802] [info][status][plugin:metric_vis] Status changed from uninitialized to green - Ready | |
log [15:02:40.808] [info][status][plugin:spyModes] Status changed from uninitialized to green - Ready | |
log [15:02:40.825] [info][status][plugin:statusPage] Status changed from uninitialized to green - Ready | |
log [15:02:40.835] [info][status][plugin:table_vis] Status changed from uninitialized to green - Ready | |
log [15:02:40.867] [info][listening] Server running at http://localhost:5601 |
7. Now click Discover on the top menu to see the results. It will show histogram of counts of event.
All the results are also listed below histogram but for security reasons, I have not shown them here..
That's it. Pretty clean, what you say?
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.