Hi Everyone,
i'm playing a bit with the ELK-Stack and i have a problem with the GeoIP-Filte of Logstash.
Via Winlogbeat I send EventLogs (more exact Network Sysmon Events). If a connection is established in generates a Event with the "DestinationIp". I want to GeoIP this adress. In ElasticSearch the Event looks like this:
{
"_index" : "windows_records-2018.06.06",
"_type" : "wineventlog",
"_id" : "AWPSjUxSYiQHMjlX73pg",
"_score" : 1.0,
"_source" : {
"computer_name" : "DESKTOP-XXXX",
"process_id" : 2876,
"log_name" : "Microsoft-Windows-Sysmon/Operational",
"level" : "Informationen",
"record_number" : "4066",
"event_data" : {
"User" : "NT-AUTORITÄT\\SYSTEM",
"SourceHostname" : "DESKTOP-XXXXX",
"SourcePort" : "50992",
"Image" : "C:\\Windows\\System32\\svchost.exe",
"DestinationPort" : "443",
"ProcessGuid" : "{6AD2706A-835F-5B15-0000-001019371F00}",
"DestinationPortName" : "https",
"UtcTime" : "2018-06-06 00:44:19.113",
"DestinationIp" : "52.114.XX.XX",
I thought the only thing to do specify in Logstash this:
filter {
geoip {
source => DestinationIp
}
}
Because in Kibana the field is called "event_data.DestinationIp" i tried this also in my logstash configuration with and without quotation marks. However i always got the tag "_geoip_lookup_failure" in the document.
I also tried to push it in a new index, but nothing help.
In my understanding logstash needs for geoip a string with an IPv4/IPv6 address which should specified with "source" in the Logstash configuration.
I have ElasticSearch "5.6.9" and ingest-geoip plugin installed
Thanks at all.