Hello everyone,
I'm trying to get started with Elastic stack and my first attempt is to index a complex JSON into ES using the following config has failed.
input {
beats {
port => 5044
tags => "beats"
}
}
filter {
json {
source => "message"
}
}
output {
elasticsearch { hosts => ["localhost:9200"] }
stdout { codec => rubydebug }
}
Perhaps there is some extra tailoring needed in order to make it work?
I've noticed that my problem is possibly due to a data structure in particular two objects:
- "imports": {"data": ["data"]}
- "sections": [ [ ] ]
Any help here would be much appreciated!
This is an example of JSON I'd like to store:
{
"vhash": "04505666234sfdfs2nz25z17z",
"submission_names": [
"a0b0fe57a5c6ff0f3359d8d21519f136615a7843"
],
"scan_date": "2017-08-23 19:13:05",
"first_seen": "2017-08-23 19:13:05",
"total": 65,
"additional_info": {
"magic": "PE32 executable for MS Windows (console) Intel 80386 32-bit",
"sigcheck": {
"link date": "5:12 AM 8/18/2017"
},
"exiftool": {
"MIMEType": "application/octet-stream",
"Subsystem": "Windows command line",
"MachineType": "Intel 386 or later, and compatibles",
"TimeStamp": "2017:08:18 05:12:57+01:00",
"FileType": "Win32 EXE",
"PEType": "PE32",
"CodeSize": "12288",
"LinkerVersion": "8.0",
"FileTypeExtension": "exe",
"InitializedDataSize": "0",
"SubsystemVersion": "5.0",
"EntryPoint": "0x1840",
"OSVersion": "4.0",
"ImageVersion": "0.0",
"UninitializedDataSize": "0"
},
"trid": "Win32 Dynamic Link Library (generic) (43.5%)\nWin32 Executable (generic) (29.8%)\nGeneric Win/DOS Executable (13.2%)\nDOS Executable Generic (13.2%)",
"pe-imphash": "f77945ec4c575514afd3ce14a41d99e0",
"pe-timestamp": 1503029577,
"imports": {
"KERNEL32.dll": [
"FreeLibrary",
"GetLastError",
"RaiseException",
"GetModuleFileNameA",
"CreateThread",
"GetProcAddress",
"LocalAlloc",
"LocalFree",
"InterlockedExchange",
"GetNumberOfConsoleInputEvents",
"ExitProcess",
"SetFileApisToANSI",
"GetOEMCP",
"GetCurrentThreadId",
"LoadLibraryA",
"SetConsoleOutputCP",
"GetModuleHandleW",
"GetBinaryTypeA"
],
"WS2_32.dll": [
"send"
],
"USER32.dll": [
"GetAsyncKeyState",
"SetProcessDefaultLayout"
]
},
"pe-entry-point": 6208,
"sections": [
[
".text",
4096,
3928,
4096,
"6.19",
"b99ec9dd44c6ad6a9647424e0cc36914"
],
[
".code",
8192,
6024,
8192,
"4.93",
"84992d7c1bef4a95c3dad93946a8e8c8"
],
[
".rdata",
16384,
2528,
4096,
"1.84",
"3ec7cc43afd3f444ac97ffdca3f19ec1"
],
[
".data",
20480,
423344,
417792,
"7.99",
"38d3a7dbccb081e7dadcd116102f310c"
],
[
".reloc",
446464,
1480,
4096,
"1.10",
"56a544f15432e1b792cf42f425e166bf"
]
],
"pe-machine-type": 332
},
"size": 442368,
"scan_id": "c06e7ad4ae7749678c213ceb734cb0a64f2d47e464198351c76ceca3363522b6-1503515585",
"times_submitted": 1,
"harmless_votes": 0,
"verbose_msg": "Scan finished, information embedded",
"sha256": "c06e7ad4ae7749678c213ceb734cb0a64f2d47e464198351c76ceca3363522b6",
"type": "Win32 EXE",
"scans": {
"Bkav": {
"detected": true,
"version": "1.3.0.9282",
"result": "HW32.Packed.F89F",
"update": "20170823"
}
},
"tags": [
"peexe"
],
"authentihash": "1492aee71ea44f0969f6ef91b4c854b692630d15735a71b5b3206e1b87890d1c",
"unique_sources": 1,
"positives": 30,
"ssdeep": "12288:ZA2Gi/n0uNIj5icepynKmUuj2cq6kfRTiA:ZA2Gisz5iHZ9nXJT",
"md5": "0067b99af76ce96087ef17d73e773f5b",
"permalink": "https://www.virustotal.com/file/c06e7ad4ae7749678c213ceb734cb0a64f2d47e464198351c76ceca3363522b6/analysis/1503515585/",
"sha1": "a0b0fe57a5c6ff0f3359d8d21519f136615a7843",
"resource": "0067b99af76ce96087ef17d73e773f5b",
"response_code": 1,
"community_reputation": 0,
"malicious_votes": 0,
"ITW_urls": [
],
"last_seen": "2017-08-23 19:13:05"
}