Filter - grok, date and kv example

I am newbie to logstash and trying to ship logs using logstash agent to splunk server. But having trouble shipping the logs. Need help / guidance.

Below is my log format:

2018.07.12.12:34:31:232 GID=xxx FID=asdf STRT=12121322
2018.07.15.14:34:31:232 GID=yyy FID=fdsa STRT=12421121

and my logstash conf is as given below:

input {
file {
path => "/logs/app.log"
start_position => beginning

filter {
grok {
match => { "message" => "%{SYSLOGPROG:logdata}%{SPACE}%{GREEDYDATA:msg} }
date {
match => ["logdata", "YYYY.MM.dd.HH:mm:ss:SSS"]
target => "logdata"
kv {
source => msg
trim => "="
target => "kv"

output {
tcp {
host => ""
port => "18604"

Hi Sid,

First of all, please format your post (code blocks) so that it is easier to read and troubleshoot.
Secondly, if you could provide clarity about what is the issue that you are facing it would allow us to help you easily.
Lastly the config that you have already in place looks good enough and is able to parse the data. One suggestion I would make is that there is no need to assign the match of %{SYSLOGPROG} to logdata. You will only add a redundant field called logdata as by default %{SYSLOGPROG} will add a field called program.

Hey @siddhardhan,

Can you show me that error log you are getting while sending the logs.

Thanks & Regards,

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.