Extract Field from Windows EventLog using Logstash


I'm new to using Logstash for parsing data. We've windows Event Logs coming though Winbeats to Logstash and then sent to Elastic Search . I am trying to extract different fields using Logstash, but it doesn't work.,

I have created a file winevents.conf under the pipeline folder (/usr/share/logstash/pipeline) and here are the contents config file -

input {
beats {
port => 1514
ssl => true
client_inactivity_timeout => 7200
ssl_verify_mode => "none"
#ssl_certificate_authorities => ["/usr/share/logstash/config/ca.cer"]
ssl_certificate => "/usr/share/logstash/config/lumberjack_cert.crt"
ssl_key => "/usr/share/logstash/config/lumberjack_cert.key"

filter {
grok {
#patterns_dir => "/etc/logstash/patterns"
match => { "message" => { message => "CLSID: '(?<appd_id>[^']+)" } }


output {
  stdout { 
	codec => rubydebug

elasticsearch {
hosts => "https://elks2.nam.io:443"
user => "something"
password => "something"
keystore => "/usr/share/logstash/config/cacerts"
keystore_password => "something"
manage_template => false
index => "%{[@metadata][beat]}-%{+YYYY.MM.dd}"

example Event in the message field -

.NET Runtime version 4.0.30319.36575 - The profiler has requested that the CLR instance not load the profiler into this process. Profiler CLSID: 'AppDynamics.AgentProfiler'. Process ID (decimal): 83484. Message ID: [0x2516]

I want to extract "AppDynamics.AgentProfiler" into a separate field appd_id .

This is my first step towards using Logstash for extractions and have more to do ; appreciate your guidance and help.

Thank you

That should be

match => { message => "CLSID: '(?<appd_id>[^']+)" }

hi @Badger

made the correction, but still doesn't work. :pensive:

Are you sure it is the message field you should be matching against?

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.