Hi all i am fairly new to Elasticsearch. I have Elasticsearc running and i have some information in my logs that i need to graph and i just don't know how filter it. So here are the contents in my message field that i need filtered.
message:{"name":"monitor","hostname":"someserver.com","pid":1627,"level":30,"counts":{"dropped_packets":0,"tcp":12025,"jobsRX":12104,"jobsTX":11476,"jobsCnt":9934,"fpTX":0,"tpRX":0,"leadsRX":11515,"leedsCnt":68749},"msg":"broadcasting..","time":"2016-05-17T20:54:30.112Z","v":0}
Here is my current filter
if [fields][log_type] == "syslog" {
grok {
match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} (?:[%{POSINT:syslog_pid}])?: %{GREEDYDATA:syslog_message}" }
add_field => [ "received_at", "%{@timestamp}" ]
add_field => [ "received_from", "%{host}" ]
}
syslog_pri { }
date {
match => [ "syslog_timestamp", "MMM d HH:mm:ss", "MMM dd HH:mm:ss" ]
}
I would ideally like to filter "dropped_packets":0,"tcp":12025,"jobsRX":12104,"jobsTX":11476,"jobsCnt":9934,"fpTX":0,"tpRX":0,"leadsRX":11515,"leedsCnt":68749 so that i can graph them in kibana 4. Any help will be much appreciated. Thanks in advance.