HI all.....I use ELK 6.2.3 with Winlogbeat and Auditbeat for Linux.
I have 20 Web Server IIS and I want to send all audit logs to Elasticsearch in only one index (for example web-2018.04.26). The Elasticsearch records another data as Palo Alto log, NGINX log ecc...so I would like to discern all Winlogbeat log from another traffic for create a dedicate web index for all IIS machines.
I have try with "tags", "fields", "type" in input filter but doesn't running successfully. There are a two simple tests.
1° test:
input
{
beats
{
port => 5003
type => "web"
}
}
output
{
if [type] == "web"
{
elasticsearch
{
hosts => "localhost:9200"
index => "web-%{+YYYY.MM.dd}"
}
}
}
2° test: with tags in winlogbeat.yml
input
{
beats
{
port => 5003
}
}
output
{
if [tags] == "web"
{
elasticsearch
{
hosts => "localhost:9200"
index => "web-%{+YYYY.MM.dd}"
}
}
}
this is a piece of winlogbeat.yml:
winlogbeat.event_logs:
- name: Security
tags: ["web"]
event_id: 4624, 4625
output.logstash:
# The Logstash hosts
hosts: ["<IP>:5003"]
Any idea for fix this situation...if is possible.....?
Thanking in advance and sorry for my english.
Best Regards
Giuliano