Hello,
I am running winlogbeat for windows event logs and filebeat on Linux for audit logs and syslogs. However I would like to index windows event logs, Linux Audit logs and sys logs separately in Elasticsearch.
My logstash.conf file is something like below.
input {
beats {
port => 5044
client_inactivity_timeout => 599
ssl => true
ssl_certificate => "/etc/pki/tls/certs/logstash-forwarder.crt"
ssl_key => "/etc/pki/tls/private/logstash-forwarder.key"
}
}
output {
if [source] == "/var/log/audit/audit.log" {
elasticsearch {
hosts => ["localhost:9200"]
index => "linux-audit-logs"
}
}
else if [source] == "/var/log/messages" {
elasticsearch {
hosts => ["localhost:9200"]
index => "linux-sys-logs"
}
}
else if [type] == event_logs{
elasticsearch {
hosts => ["localhost:9200"]
sniffing => true
manage_template => false
index => "windows-event-logs"
}
}
}
However I can only see two indices in Elasticsearch linux-sys-logs and linux-audit-logs and not event logs. Not sure what mistake I am making here.
Thanks,