Configure filebeat as indicated in the kibana integrations with the following steps:
curl -L -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-8.6.2-amd64.deb
sudo dpkg -i filebeat-8.6.2-amd64.deb
(modify these sections in /etc/filebeat/filebeat.yml)
output.elasticsearch:
hosts: ["<es_url>"]
username: "elastic"
password: "<password>"
# If using Elasticsearch's default certificate
ssl.ca_trusted_fingerprint: "<es cert fingerprint>"
setup.kibana:
host: "<kibana_url>"
filebeat modules enable activemq
filebeat setup
service filebeat start
observed that the filebeat-* index was created but it has no information
The connection is established correctly
service filebeat status without errors
Mar 19 22:22:02 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:22:02.692-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":420,"time":{"ms":10}},"total":{"ticks":1060,"time":{"ms":10},"value":1060},"user":{"ticks":640}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2013100},"version":"8.6.2"},"memstats":{"gc_next":17907720,"memory_alloc":9049240,"memory_total":64398416,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.2,"15":0.29,"5":0.25,"norm":{"1":0.05,"15":0.0725,"5":0.0625}}}},"ecs.version":"1.6.0"}}
Mar 19 22:22:32 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:22:32.693-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":430,"time":{"ms":10}},"total":{"ticks":1070,"time":{"ms":10},"value":1070},"user":{"ticks":640}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2043099},"version":"8.6.2"},"memstats":{"gc_next":17907720,"memory_alloc":9232032,"memory_total":64581208,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.2,"15":0.29,"5":0.24,"norm":{"1":0.05,"15":0.0725,"5":0.06}}}},"ecs.version":"1.6.0"}}
Mar 19 22:23:02 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:23:02.693-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":430},"total":{"ticks":1080,"time":{"ms":10},"value":1080},"user":{"ticks":650,"time":{"ms":10}}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2073101},"version":"8.6.2"},"memstats":{"gc_next":17907720,"memory_alloc":8687192,"memory_total":64752856,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.12,"15":0.27,"5":0.22,"norm":{"1":0.03,"15":0.0675,"5":0.055}}}},"ecs.version":"1.6.0"}}
Mar 19 22:23:32 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:23:32.694-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":440,"time":{"ms":10}},"total":{"ticks":1100,"time":{"ms":20},"value":1100},"user":{"ticks":660,"time":{"ms":10}}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2103101},"version":"8.6.2"},"memstats":{"gc_next":17907720,"memory_alloc":8838968,"memory_total":64904632,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.43,"15":0.29,"5":0.28,"norm":{"1":0.1075,"15":0.0725,"5":0.07}}}},"ecs.version":"1.6.0"}}
Mar 19 22:24:02 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:24:02.694-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":440},"total":{"ticks":1100,"value":1100},"user":{"ticks":660}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2133102},"version":"8.6.2"},"memstats":{"gc_next":17907720,"memory_alloc":9049800,"memory_total":65115464,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.47,"15":0.3,"5":0.3,"norm":{"1":0.1175,"15":0.075,"5":0.075}}}},"ecs.version":"1.6.0"}}
Mar 19 22:24:32 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:24:32.693-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":440},"total":{"ticks":1110,"time":{"ms":10},"value":1110},"user":{"ticks":670,"time":{"ms":10}}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2163100},"version":"8.6.2"},"memstats":{"gc_next":17907720,"memory_alloc":9282128,"memory_total":65347792,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.28,"15":0.29,"5":0.27,"norm":{"1":0.07,"15":0.0725,"5":0.0675}}}},"ecs.version":"1.6.0"}}
Mar 19 22:25:02 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:25:02.691-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":460,"time":{"ms":20}},"total":{"ticks":1140,"time":{"ms":30},"value":1140},"user":{"ticks":680,"time":{"ms":10}}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2193100},"version":"8.6.2"},"memstats":{"gc_next":17908744,"memory_alloc":8700512,"memory_total":65485824,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.51,"15":0.3,"5":0.32,"norm":{"1":0.1275,"15":0.075,"5":0.08}}}},"ecs.version":"1.6.0"}}
Mar 19 22:25:32 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:25:32.692-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":460},"total":{"ticks":1140,"value":1140},"user":{"ticks":680}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2223099},"version":"8.6.2"},"memstats":{"gc_next":17908744,"memory_alloc":8900608,"memory_total":65685920,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.45,"15":0.3,"5":0.32,"norm":{"1":0.1125,"15":0.075,"5":0.08}}}},"ecs.version":"1.6.0"}}
Mar 19 22:26:02 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:26:02.695-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":460},"total":{"ticks":1150,"time":{"ms":10},"value":1150},"user":{"ticks":690,"time":{"ms":10}}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2253103},"version":"8.6.2"},"memstats":{"gc_next":17908744,"memory_alloc":9090232,"memory_total":65875544,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.4,"15":0.3,"5":0.32,"norm":{"1":0.1,"15":0.075,"5":0.08}}}},"ecs.version":"1.6.0"}}
Mar 19 22:26:32 XXXXXXXXXXX filebeat[87915]: {"log.level":"info","@timestamp":"2023-03-19T22:26:32.693-0300","log.logger":"monitoring","log.origin":{"file.name":"log/log.go","file.line":187},"message":"Non-zero metrics in the last 30s","service.name":"filebeat","monitoring":{"metrics":{"beat":{"cpu":{"system":{"ticks":470,"time":{"ms":10}},"total":{"ticks":1160,"time":{"ms":10},"value":1160},"user":{"ticks":690}},"handles":{"limit":{"hard":4096,"soft":1024},"open":10},"info":{"ephemeral_id":"6a756f02-ba2e-43c2-bbb8-3225917032b1","uptime":{"ms":2283101},"version":"8.6.2"},"memstats":{"gc_next":17908744,"memory_alloc":9203840,"memory_total":65989152,"rss":101171200},"runtime":{"goroutines":12}},"filebeat":{"events":{"active":0},"harvester":{"open_files":0,"running":0}},"libbeat":{"config":{"module":{"running":0}},"output":{"events":{"active":0}},"pipeline":{"clients":0,"events":{"active":0}}},"registrar":{"states":{"current":0}},"system":{"load":{"1":0.37,"15":0.3,"5":0.32,"norm":{"1":0.0925,"15":0.075,"5":0.08}}}},"ecs.version":"1.6.0"}}
filebeat.yml
###################### Filebeat Configuration Example #########################
# This file is an example configuration file highlighting only the most common
# options. The filebeat.reference.yml file from the same directory contains all the
# supported options with more comments. You can use it as a reference.
#
# You can find the full configuration reference here:
# https://www.elastic.co/guide/en/beats/filebeat/index.html
# For more available modules and options, please see the filebeat.reference.yml sample
# configuration file.
# ============================== Filebeat inputs ===============================
filebeat.inputs:
# Each - is an input. Most options can be set at the input level, so
# you can use different inputs for various configurations.
# Below are the input specific configurations.
# filestream is an input for collecting log messages from files.
- type: filestream
# Unique ID among all inputs, an ID is required.
id: my-filestream-id
# Change to true to enable this input configuration.
enabled: false
# Paths that should be crawled and fetched. Glob based paths.
paths:
- /var/log/*.log
#- c:\programdata\elasticsearch\logs\*
# Exclude lines. A list of regular expressions to match. It drops the lines that are
# matching any regular expression from the list.
# Line filtering happens after the parsers pipeline. If you would like to filter lines
# before parsers, use include_message parser.
#exclude_lines: ['^DBG']
# Include lines. A list of regular expressions to match. It exports the lines that are
# matching any regular expression from the list.
# Line filtering happens after the parsers pipeline. If you would like to filter lines
# before parsers, use include_message parser.
#include_lines: ['^ERR', '^WARN']
# Exclude files. A list of regular expressions to match. Filebeat drops the files that
# are matching any regular expression from the list. By default, no files are dropped.
#prospector.scanner.exclude_files: ['.gz$']
# Optional additional fields. These fields can be freely picked
# to add additional information to the crawled log files for filtering
#fields:
# level: debug
# review: 1
# ============================== Filebeat modules ==============================
filebeat.config.modules:
# Glob pattern for configuration loading
path: ${path.config}/modules.d/*.yml
# Set to true to enable config reloading
reload.enabled: false
# Period on which files under path should be checked for changes
#reload.period: 10s
module: activemq
audit:
enabled: true
var.paths: ["/XXXX/active-mq/data/audit.log*"]
log:
enabled: true
var.paths: ["/XXXXX/active-mq/data/activemq.log*"]
# ======================= Elasticsearch template setting =======================
setup.template.settings:
index.number_of_shards: 1
#index.codec: best_compression
#_source.enabled: false
# ================================== General ===================================
# The name of the shipper that publishes the network data. It can be used to group
# all the transactions sent by a single shipper in the web interface.
#name:
# The tags of the shipper are included in their own field with each
# transaction published.
#tags: ["service-X", "web-tier"]
# Optional fields that you can specify to add additional information to the
# output.
#fields:
# env: staging
# ================================= Dashboards =================================
# These settings control loading the sample dashboards to the Kibana index. Loading
# the dashboards is disabled by default and can be enabled either by setting the
# options here or by using the `setup` command.
#setup.dashboards.enabled: false
# The URL from where to download the dashboards archive. By default this URL
# has a value which is computed based on the Beat name and version. For released
# versions, this URL points to the dashboard archive on the artifacts.elastic.co
# website.
#setup.dashboards.url:
# =================================== Kibana ===================================
# Starting with Beats version 6.0.0, the dashboards are loaded via the Kibana API.
# This requires a Kibana endpoint configuration.
setup.kibana:
# Kibana Host
# Scheme and port can be left out and will be set to the default (http and 5601)
# In case you specify and additional path, the scheme is required: http://localhost:5601/path
# IPv6 addresses should always be defined as: https://[2001:db8::1]:5601
host: "XXXXXXXXXX:80"
# Kibana Space ID
# ID of the Kibana Space into which the dashboards should be loaded. By default,
# the Default Space will be used.
#space.id:
# =============================== Elastic Cloud ================================
# These settings simplify using Filebeat with the Elastic Cloud (https://cloud.elastic.co/).
# The cloud.id setting overwrites the `output.elasticsearch.hosts` and
# `setup.kibana.host` options.
# You can find the `cloud.id` in the Elastic Cloud web UI.
#cloud.id:
# The cloud.auth setting overwrites the `output.elasticsearch.username` and
# `output.elasticsearch.password` settings. The format is `<user>:<pass>`.
#cloud.auth:
# ================================== Outputs ===================================
# Configure what output to use when sending the data collected by the beat.
# ---------------------------- Elasticsearch Output ----------------------------
output.elasticsearch:
# Array of hosts to connect to.
hosts: ["http://XXXXXXXXXX:9200"]
# Protocol - either `http` (default) or `https`.
protocol: "http"
# Authentication credentials - either API key or username/password.
#api_key: "id:api_key"
username: "elastic"
password: "XXXXXXXXXX"
# ------------------------------ Logstash Output -------------------------------
#output.logstash:
# The Logstash hosts
#hosts: ["localhost:5044"]
# Optional SSL. By default is off.
# List of root certificates for HTTPS server verifications
#ssl.certificate_authorities: ["/etc/pki/root/ca.pem"]
# Certificate for SSL client authentication
#ssl.certificate: "/etc/pki/client/cert.pem"
# Client Certificate Key
#ssl.key: "/etc/pki/client/cert.key"
# ================================= Processors =================================
processors:
- add_host_metadata:
when.not.contains.tags: forwarded
- add_cloud_metadata: ~
- add_docker_metadata: ~
- add_kubernetes_metadata: ~
# ================================== Logging ===================================
# Sets log level. The default log level is info.
# Available log levels are: error, warning, info, debug
#logging.level: debug
# At debug level, you can selectively enable logging only for some components.
# To enable all selectors use ["*"]. Examples of other selectors are "beat",
# "publisher", "service".
#logging.selectors: ["*"]
# ============================= X-Pack Monitoring ==============================
# Filebeat can export internal metrics to a central Elasticsearch monitoring
# cluster. This requires xpack monitoring to be enabled in Elasticsearch. The
# reporting is disabled by default.
# Set to true to enable the monitoring reporter.
#monitoring.enabled: false
# Sets the UUID of the Elasticsearch cluster under which monitoring data for this
# Filebeat instance will appear in the Stack Monitoring UI. If output.elasticsearch
# is enabled, the UUID is derived from the Elasticsearch cluster referenced by output.elasticsearch.
#monitoring.cluster_uuid:
# Uncomment to send the metrics to Elasticsearch. Most settings from the
# Elasticsearch output are accepted here as well.
# Note that the settings should point to your Elasticsearch *monitoring* cluster.
# Any setting that is not set is automatically inherited from the Elasticsearch
# output configuration, so if you have the Elasticsearch output configured such
# that it is pointing to your Elasticsearch monitoring cluster, you can simply
# uncomment the following line.
#monitoring.elasticsearch:
# ============================== Instrumentation ===============================
# Instrumentation support for the filebeat.
#instrumentation:
# Set to true to enable instrumentation of filebeat.
#enabled: false
# Environment in which filebeat is running on (eg: staging, production, etc.)
#environment: ""
# APM Server hosts to report instrumentation results to.
#hosts:
# - http://localhost:8200
# API Key for the APM Server(s).
# If api_key is set then secret_token will be ignored.
#api_key:
# Secret token for the APM Server(s).
#secret_token:
# ================================= Migration ==================================
# This allows to enable 6.7 migration aliases
#migration.6_to_7.enabled: true
As far as I can see, everything is fine, but I don't see any errors.