Filebeat 8.5.2 Failed to start Filebeat sends log files to Logstash or directly to Elasticsearch

Hello when I run filebeat I get this error:

sudo service filebeat status

filebeat.service - Filebeat sends log files to Logstash or directly to Elasticsearch.
     Loaded: loaded (/lib/systemd/system/filebeat.service; enabled; vendor preset: enabled)
     Active: failed (Result: exit-code) since Thu 2022-12-01 15:15:08 UTC; 6s ago
       Docs: https://www.elastic.co/beats/filebeat
    Process: 117031 ExecStart=/usr/share/filebeat/bin/filebeat --environment systemd $BEAT_LOG_OPTS $BEAT_CONFIG_OPTS $BEAT_PATH_OPTS (code=exited, status=1/FAILURE)
   Main PID: 117031 (code=exited, status=1/FAILURE)
        CPU: 155ms

Dec 01 15:15:07 kibana.underpass.fr systemd[1]: filebeat.service: Main process exited, code=exited, status=1/FAILURE
Dec 01 15:15:07 kibana.underpass.fr systemd[1]: filebeat.service: Failed with result 'exit-code'.
Dec 01 15:15:08 kibana.underpass.fr systemd[1]: filebeat.service: Scheduled restart job, restart counter is at 5.
Dec 01 15:15:08 kibana.underpass.fr systemd[1]: Stopped Filebeat sends log files to Logstash or directly to Elasticsearch..
Dec 01 15:15:08 kibana.underpass.fr systemd[1]: filebeat.service: Start request repeated too quickly.
Dec 01 15:15:08 kibana.underpass.fr systemd[1]: filebeat.service: Failed with result 'exit-code'.
Dec 01 15:15:08 kibana.underpass.fr systemd[1]: Failed to start Filebeat sends log files to Logstash or directly to Elasticsearch..

Here is my setup filebeat.yml

###################### Filebeat Configuration Example #########################

# This file is an example configuration file highlighting only the most common
# options. The filebeat.reference.yml file from the same directory contains all the
# supported options with more comments. You can use it as a reference.
#
# You can find the full configuration reference here:
# https://www.elastic.co/guide/en/beats/filebeat/index.html

# For more available modules and options, please see the filebeat.reference.yml sample
# configuration file.

# ============================== Filebeat inputs ===============================

filebeat.inputs:

# Each - is an input. Most options can be set at the input level, so
# you can use different inputs for various configurations.
# Below are the input specific configurations.

# filestream is an input for collecting log messages from files.
- type: filestream

  # Unique ID among all inputs, an ID is required.
  id: apache-filestream-id

  # Change to true to enable this input configuration.
  enabled: true

  # Paths that should be crawled and fetched. Glob based paths.
  paths:
    - /var/log/apache/*.log
    #- c:\programdata\elasticsearch\logs\*

  # Exclude lines. A list of regular expressions to match. It drops the lines that are
  # matching any regular expression from the list.
  # Line filtering happens after the parsers pipeline. If you would like to filter lines
  # before parsers, use include_message parser.
  #exclude_lines: ['^DBG']

  # Include lines. A list of regular expressions to match. It exports the lines that are
  # matching any regular expression from the list.
  # Line filtering happens after the parsers pipeline. If you would like to filter lines
  # before parsers, use include_message parser.
  #include_lines: ['^ERR', '^WARN']

  # Exclude files. A list of regular expressions to match. Filebeat drops the files that
  # are matching any regular expression from the list. By default, no files are dropped.
  #prospector.scanner.exclude_files: ['.gz$']

  # Optional additional fields. These fields can be freely picked
  # to add additional information to the crawled log files for filtering
  #fields:
  #  level: debug
  #  review: 1

# ============================== Filebeat modules ==============================

filebeat.config.modules:
  # Glob pattern for configuration loading
  path: ${path.config}/modules.d/*.yml

  # Set to true to enable config reloading
  reload.enabled: false

  # Period on which files under path should be checked for changes
  #reload.period: 10s

# ======================= Elasticsearch template setting =======================

setup.template.settings:
  index.number_of_shards: 1
  #index.codec: best_compression
  #_source.enabled: false


# ================================== General ===================================

# The name of the shipper that publishes the network data. It can be used to group
# all the transactions sent by a single shipper in the web interface.
#name:

# The tags of the shipper are included in their own field with each
# transaction published.
#tags: ["service-X", "web-tier"]

# Optional fields that you can specify to add additional information to the
# output.
#fields:
#  env: staging

# ================================= Dashboards =================================
# These settings control loading the sample dashboards to the Kibana index. Loading
# the dashboards is disabled by default and can be enabled either by setting the
# options here or by using the `setup` command.
#setup.dashboards.enabled: false

# The URL from where to download the dashboards archive. By default this URL
# has a value which is computed based on the Beat name and version. For released
# versions, this URL points to the dashboard archive on the artifacts.elastic.co
# website.
#setup.dashboards.url:

# =================================== Kibana ===================================

# Starting with Beats version 6.0.0, the dashboards are loaded via the Kibana API.
# This requires a Kibana endpoint configuration.
setup.kibana:

  # Kibana Host
  # Scheme and port can be left out and will be set to the default (http and 5601)
  # In case you specify and additional path, the scheme is required: http://localhost:5601/path
  # IPv6 addresses should always be defined as: https://[2001:db8::1]:5601
  #host: "localhost:5601"

  # Kibana Space ID
  # ID of the Kibana Space into which the dashboards should be loaded. By default,
  # the Default Space will be used.
  #space.id:

# =============================== Elastic Cloud ================================

# These settings simplify using Filebeat with the Elastic Cloud (https://cloud.elastic.co/).

# The cloud.id setting overwrites the `output.elasticsearch.hosts` and
# `setup.kibana.host` options.
# You can find the `cloud.id` in the Elastic Cloud web UI.
#cloud.id:

# The cloud.auth setting overwrites the `output.elasticsearch.username` and
# `output.elasticsearch.password` settings. The format is `<user>:<pass>`.
#cloud.auth:

# ================================== Outputs ===================================

# Configure what output to use when sending the data collected by the beat.

# ---------------------------- Elasticsearch Output ----------------------------
output.elasticsearch:
  # Array of hosts to connect to.
  hosts: ["url.fr:9200"]

  # Protocol - either `http` (default) or `https`.
  protocol: "https"

  # Authentication credentials - either API key or username/password.
  #api_key: "id:api_key"
  username: "elastic"
  password: "password"

# ------------------------------ Logstash Output -------------------------------
#output.logstash:
  # The Logstash hosts
  #hosts: ["localhost:5044"]

  # Optional SSL. By default is off.
  # List of root certificates for HTTPS server verifications
  #ssl.certificate_authorities: ["/etc/pki/root/ca.pem"]

  # Certificate for SSL client authentication
  #ssl.certificate: "/etc/pki/client/cert.pem"

  # Client Certificate Key
  #ssl.key: "/etc/pki/client/cert.key"

# ================================= Processors =================================
processors:
  - add_host_metadata:
      when.not.contains.tags: forwarded
  - add_cloud_metadata: ~
  - add_docker_metadata: ~
  - add_kubernetes_metadata: ~

# ================================== Logging ===================================

# Sets log level. The default log level is info.
# Available log levels are: error, warning, info, debug
#logging.level: debug

# At debug level, you can selectively enable logging only for some components.
# To enable all selectors use ["*"]. Examples of other selectors are "beat",
# "publisher", "service".
#logging.selectors: ["*"]

# ============================= X-Pack Monitoring ==============================
# Filebeat can export internal metrics to a central Elasticsearch monitoring
# cluster.  This requires xpack monitoring to be enabled in Elasticsearch.  The
# reporting is disabled by default.

# Set to true to enable the monitoring reporter.
#monitoring.enabled: false

# Sets the UUID of the Elasticsearch cluster under which monitoring data for this
# Filebeat instance will appear in the Stack Monitoring UI. If output.elasticsearch
# is enabled, the UUID is derived from the Elasticsearch cluster referenced by output.elasticsearch.
#monitoring.cluster_uuid:

# Uncomment to send the metrics to Elasticsearch. Most settings from the
# Elasticsearch output are accepted here as well.
# Note that the settings should point to your Elasticsearch *monitoring* cluster.
# Any setting that is not set is automatically inherited from the Elasticsearch
# output configuration, so if you have the Elasticsearch output configured such
# that it is pointing to your Elasticsearch monitoring cluster, you can simply
# uncomment the following line.
#monitoring.elasticsearch:

# ============================== Instrumentation ===============================

# Instrumentation support for the filebeat.
#instrumentation:
    # Set to true to enable instrumentation of filebeat.
    #enabled: false

    # Environment in which filebeat is running on (eg: staging, production, etc.)
    #environment: ""

    # APM Server hosts to report instrumentation results to.
    #hosts:
    #  - http://localhost:8200

    # API Key for the APM Server(s).
    # If api_key is set then secret_token will be ignored.
    #api_key:

    # Secret token for the APM Server(s).
    #secret_token:


# ================================= Migration ==================================

# This allows to enable 6.7 migration aliases
#migration.6_to_7.enabled: true

And the commande test: filebeat test output

filebeat  test output
elasticsearch: https://url.fr:9200...
  parse url... OK
  connection...
    parse host... OK
    dns lookup... OK
    addresses: addrIP
    dial up... OK
  TLS...
    security: server's certificate chain verification is enabled
    handshake... OK
    TLS version: TLSv1.3
    dial up... OK
  talk to server... OK
  version: 8.5.2

You need to look at the server log file to see why the service could not start.

Look at /var/log/messages or /var/log/syslog for some hint of why it didn't started.

Logs can also be viewed with

journalctl -u filebeat.service

or

journalctl -u filebeat.service -f

Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.891+0100","log.origin":{"file.name":"instance/beat.go","file.line":708},"message":"Home path: [/usr/share/filebeat] Config path: [/etc/filebeat] Data path: [/var/lib/filebeat] Logs path: [/var/log/filebeat]","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.892+0100","log.origin":{"file.name":"instance/beat.go","file.line":716},"message":"Beat ID: 60ad8118-c45b-4f6e-89c0-318aa4244f01","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"warn","@timestamp":"2022-12-01T22:22:31.913+0100","log.logger":"add_cloud_metadata","log.origin":{"file.name":"add_cloud_metadata/provider_aws_ec2.go","file.line":97},"message":"error when check request status for getting IMDSv2 token: http request status 404. No token in the metadata request will be used.","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.918+0100","log.logger":"seccomp","log.origin":{"file.name":"seccomp/seccomp.go","file.line":124},"message":"Syscall filter successfully installed","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.919+0100","log.logger":"beat","log.origin":{"file.name":"instance/beat.go","file.line":1082},"message":"Beat info","service.name":"filebeat","system_info":{"beat":{"path":{"config":"/etc/filebeat","data":"/var/lib/filebeat","home":"/usr/share/filebeat","logs":"/var/log/filebeat"},"type":"filebeat","uuid":"60ad8118-c45b-4f6e-89c0-318aa4244f01"},"ecs.version":"1.6.0"}}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.919+0100","log.logger":"beat","log.origin":{"file.name":"instance/beat.go","file.line":1091},"message":"Build info","service.name":"filebeat","system_info":{"build":{"commit":"1ebd0940bd56943642ea8d63d1fe8227f86e7435","libbeat":"8.5.2","time":"2022-11-15T20:38:43.000Z","version":"8.5.2"},"ecs.version":"1.6.0"}}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.919+0100","log.logger":"beat","log.origin":{"file.name":"instance/beat.go","file.line":1094},"message":"Go runtime info","service.name":"filebeat","system_info":{"go":{"os":"linux","arch":"amd64","max_procs":1,"version":"go1.18.7"},"ecs.version":"1.6.0"}}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.920+0100","log.logger":"beat","log.origin":{"file.name":"instance/beat.go","file.line":1098},"message":"Host info","service.name":"filebeat","system_info":{"host":{"architecture":"x86_64","boot_time":"2022-11-21T20:04:58+01:00","containerized":false,"name":"url","ip":["127.0.0.1/8","::1/128","IPlocalhost/32","2001:41d0:302:2200::29ca/56","fe80::f816:3eff:fe0b:134a/64"],"kernel_version":"5.10.0-19-cloud-amd64","mac":["fa:16:3e:0b:13:4a"],"os":{"type":"linux","family":"debian","platform":"debian","name":"Debian GNU/Linux","version":"11 (bullseye)","major":11,"minor":0,"patch":0,"codename":"bullseye"},"timezone":"CET","timezone_offset_sec":3600,"id":"4301b538eb0749afb98fa8228f2c918b"},"ecs.version":"1.6.0"}}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.922+0100","log.logger":"beat","log.origin":{"file.name":"instance/beat.go","file.line":1127},"message":"Process info","service.name":"filebeat","system_info":{"process":{"capabilities":{"inheritable":null,"permitted":["chown","dac_override","dac_read_search","fowner","fsetid","kill","setgid","setuid","setpcap","linux_immutable","net_bind_service","net_broadcast","net_admin","net_raw","ipc_lock","ipc_owner","sys_module","sys_rawio","sys_chroot","sys_ptrace","sys_pacct","sys_admin","sys_boot","sys_nice","sys_resource","sys_time","sys_tty_config","mknod","lease","audit_write","audit_control","setfcap","mac_override","mac_admin","syslog","wake_alarm","block_suspend","audit_read","38","39","40"],"effective":["chown","dac_override","dac_read_search","fowner","fsetid","kill","setgid","setuid","setpcap","linux_immutable","net_bind_service","net_broadcast","net_admin","net_raw","ipc_lock","ipc_owner","sys_module","sys_rawio","sys_chroot","sys_ptrace","sys_pacct","sys_admin","sys_boot","sys_nice","sys_resource","sys_time","sys_tty_config","mknod","lease","audit_write","audit_control","setfcap","mac_override","mac_admin","syslog","wake_alarm","block_suspend","audit_read","38","39","40"],"bounding":["chown","dac_override","dac_read_search","fowner","fsetid","kill","setgid","setuid","setpcap","linux_immutable","net_bind_service","net_broadcast","net_admin","net_raw","ipc_lock","ipc_owner","sys_module","sys_rawio","sys_chroot","sys_ptrace","sys_pacct","sys_admin","sys_boot","sys_nice","sys_resource","sys_time","sys_tty_config","mknod","lease","audit_write","audit_control","setfcap","mac_override","mac_admin","syslog","wake_alarm","block_suspend","audit_read","38","39","40"],"ambient":null},"cwd":"/","exe":"/usr/share/filebeat/bin/filebeat","name":"filebeat","pid":119350,"ppid":1,"seccomp":{"mode":"filter","no_new_privs":true},"start_time":"2022-12-01T22:22:31.060+0100"},"ecs.version":"1.6.0"}}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.922+0100","log.origin":{"file.name":"instance/beat.go","file.line":294},"message":"Setup Beat: filebeat; Version: 8.5.2","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.927+0100","log.logger":"esclientleg","log.origin":{"file.name":"eslegclient/connection.go","file.line":108},"message":"elasticsearch url: https://urlElastic:9200","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.928+0100","log.logger":"publisher","log.origin":{"file.name":"pipeline/module.go","file.line":113},"message":"Beat name: url","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.928+0100","log.logger":"modules","log.origin":{"file.name":"fileset/modules.go","file.line":120},"message":"Enabled modules/filesets: ","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.929+0100","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":144},"message":"Starting metrics logging every 30s","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.929+0100","log.origin":{"file.name":"instance/beat.go","file.line":471},"message":"filebeat start running.","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.930+0100","log.origin":{"file.name":"memlog/store.go","file.line":134},"message":"Finished loading transaction log file for '/var/lib/filebeat/registry/filebeat'. Active transaction id=79","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.931+0100","log.logger":"registrar","log.origin":{"file.name":"registrar/registrar.go","file.line":109},"message":"States Loaded from registrar: 1","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.931+0100","log.logger":"crawler","log.origin":{"file.name":"beater/crawler.go","file.line":71},"message":"Loading Inputs: 1","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.931+0100","log.logger":"crawler","log.origin":{"file.name":"beater/crawler.go","file.line":117},"message":"starting input, keys present on the config: [filebeat.inputs.0.enabled filebeat.inputs.0.id filebeat.inputs.0.paths.0 filebeat.inputs.0.type]","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.931+0100","log.logger":"crawler","log.origin":{"file.name":"beater/crawler.go","file.line":148},"message":"Starting input (ID: 3633548496586988626)","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.932+0100","log.logger":"modules","log.origin":{"file.name":"fileset/modules.go","file.line":120},"message":"Enabled modules/filesets: ","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.932+0100","log.origin":{"file.name":"beater/crawler.go","file.line":155},"message":"Stopping Crawler","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.932+0100","log.origin":{"file.name":"beater/crawler.go","file.line":165},"message":"Stopping 1 inputs","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.933+0100","log.logger":"input.filestream","log.origin":{"file.name":"compat/compat.go","file.line":113},"message":"Input 'filestream' starting","service.name":"filebeat","id":"apache-filestream-id","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.933+0100","log.logger":"crawler","log.origin":{"file.name":"beater/crawler.go","file.line":170},"message":"Stopping input: 3633548496586988626","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.933+0100","log.logger":"input.filestream","log.origin":{"file.name":"compat/compat.go","file.line":126},"message":"Input 'filestream' stopped (goroutine)","service.name":"filebeat","id":"apache-filestream-id","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.933+0100","log.logger":"input.filestream","log.origin":{"file.name":"compat/compat.go","file.line":134},"message":"Input 'filestream' stopped (runner)","service.name":"filebeat","id":"apache-filestream-id","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.933+0100","log.origin":{"file.name":"beater/crawler.go","file.line":185},"message":"Crawler stopped","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.934+0100","log.logger":"registrar","log.origin":{"file.name":"registrar/registrar.go","file.line":132},"message":"Stopping Registrar","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.934+0100","log.logger":"registrar","log.origin":{"file.name":"registrar/registrar.go","file.line":166},"message":"Ending Registrar","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.934+0100","log.logger":"registrar","log.origin":{"file.name":"registrar/registrar.go","file.line":137},"message":"Registrar stopped","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.938+0100","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":194},"message":"Total metrics","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cgroup":{"cpu":{"id":"filebeat.service","stats":{"periods":0,"throttled":{"ns":0,"periods":0}}},"memory":{"id":"filebeat.service","mem":{"usage":{"bytes":60846080}}}},"cpu":{"system":{"ticks":30,"time":{"ms":30}},"total":{"ticks":130,"time":{"ms":130},"value":130},"user":{"ticks":100,"time":{"ms":100}}},"handles":{"limit":{"hard":524288,"soft":1024},"open":16},"info":{"ephemeral_id":"dfe50b4f-4d8a-428c-a337-bd8c95dd0db2","name":"filebeat","uptime":{"ms":109},"version":"8.5.2"},"memstats":{"gc_next":57434216,"memory_alloc":43235064,"memory_sys":54084616,"memory_total":51654920,"rss":133537792},"runtime":{"goroutines":31}},"filebeat":{"events":{"active":0,"added":0,"done":0},"harvester":{"closed":0,"open_files":0,"running":0,"skipped":0,"started":0},"input":{"log":{"files":{"renamed":0,"truncated":0}},"netflow":{"flows":0,"packets":{"dropped":0,"received":0}}}},"libbeat":{"config":{"module":{"running":0,"starts":0,"stops":0},"reloads":0,"scans":0},"output":{"events":{"acked":0,"active":0,"batches":0,"dropped":0,"duplicates":0,"failed":0,"toomany":0,"total":0},"read":{"bytes":0,"errors":0},"type":"elasticsearch","write":{"bytes":0,"errors":0}},"pipeline":{"clients":0,"events":{"active":0,"dropped":0,"failed":0,"filtered":0,"published":0,"retry":0,"total":0},"queue":{"acked":0,"max_events":4096}}},"registrar":{"states":{"cleanup":0,"current":0,"update":0},"writes":{"fail":0,"success":0,"total":0}},"system":{"cpu":{"cores":1},"load":{"1":0.04,"15":0,"5":0.02,"norm":{"1":0.04,"15":0,"5":0.02}}}},"ecs.version":"1.6.0"}}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.939+0100","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":195},"message":"Uptime: 113.414321ms","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.939+0100","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":162},"message":"Stopping metrics logging.","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"info","@timestamp":"2022-12-01T22:22:31.939+0100","log.origin":{"file.name":"instance/beat.go","file.line":476},"message":"filebeat stopped.","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: {"log.level":"error","@timestamp":"2022-12-01T22:22:31.939+0100","log.origin":{"file.name":"instance/beat.go","file.line":1057},"message":"Exiting: Failed to start crawler: creating module reloader failed: could not create module registry for filesets: module system is configured but has no enabled filesets","service.name":"filebeat","ecs.version":"1.6.0"}
Dec 01 22:22:31 url filebeat[119350]: Exiting: Failed to start crawler: creating module reloader failed: could not create module registry for filesets: module system is configured but has no enabled filesets
Dec 01 22:22:31 url systemd[1]: filebeat.service: Main process exited, code=exited, status=1/FAILURE
Dec 01 22:22:31 url systemd[1]: filebeat.service: Failed with result 'exit-code'.
Dec 01 22:22:32 url systemd[1]: filebeat.service: Scheduled restart job, restart counter is at 4.
Dec 01 22:22:32 url systemd[1]: Stopped Filebeat sends log files to Logstash or directly to Elasticsearch..
Dec 01 22:22:32 url systemd[1]: Started Filebeat sends log files to Logstash or directly to Elasticsearch..

You have the system.yml enabled but nothing enabled inside it.

So either disable the module or enable 1 or more of the filesets.

Also if you are shipping apache logs you should probably use the apache module.

Instead of just a filestream input.

Thank you for the answer it was the type: that I put in apache and it works

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.