I have customer who ingests logs with CEF filebeat module. There is this field:"event.original:" and it does not index so it is not searchable.
They ingest barracuda logs in this way. But I have trouble on setting up barracuda module. It gives me this error when I enable module and run "sudo filebeat setup -e"
2022-03-15T15:32:39.986Z ERROR instance/beat.go:1015 Exiting: 1 error: error loading config file: invalid config: yaml: line 8: did not find expected key
Exiting: 1 error: error loading config file: invalid config: yaml: line 8: did not find expected key
Maybe I`m doing something wrong with this configuration? I have set up CEF module and it is good. As well as threatintel and works as well, but for some reason this is not working
UPDATE:
I have figured out that when uncommenting these lines it gives error just one line before last uncomment:
Exiting: 1 error: error loading config file: invalid config: yaml: line 8: did not find expected key
Maybe I`m doing something wrong with configuring this module?
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.