HI all.....I use ELK 6.2.3 with Winlogbeat and Auditbeat for Linux.
I have 20 Web Server IIS and I want to send all audit logs to Elasticsearch in only one index (for example web-2018.04.26). The Elasticsearch records another data as Palo Alto log, NGINX log ecc...so I would like to discern all Winlogbeat log from another traffic for create a dedicate web index for all IIS machines.
I have try with "tags", "fields", "type" in input filter but doesn't running successfully. There are a two simple tests.
1° test:
input
{
  beats
  {
    port => 5003
    type => "web"
  }
}
output
{
  if [type] == "web"
  {
    elasticsearch
    {
      hosts => "localhost:9200"
      index => "web-%{+YYYY.MM.dd}"
    }
  }
}
2° test: with tags in winlogbeat.yml
input
{
  beats
  {
    port => 5003
  }
}
output
{
  if [tags] == "web"
  {
    elasticsearch
    {
      hosts => "localhost:9200"
      index => "web-%{+YYYY.MM.dd}"
    }
  }
}
this is a piece of winlogbeat.yml:
winlogbeat.event_logs:
  - name: Security
    tags: ["web"]
    event_id: 4624, 4625
output.logstash:
  # The Logstash hosts
  hosts: ["<IP>:5003"]
Any idea for fix this situation...if is possible.....?
Thanking in advance and sorry for my english.
Best Regards
Giuliano