Hello, I've configured our Cisco UCS / Fabric Interconnect device to send its syslogs to Logstash, and using tcpdump -n dst port 514
I can see that the devices are connecting to that port on the Logstash node. However, the index that I have configured for these messages does not appear to exist in Elasticsearch. I've posted the relevant sections of logstash.conf below:
input {
tcp {
port => 514
type => syslogucs
}
udp {
port => 514
type => syslogucs
}
}
filter {
if [type] == "syslogucs" {
grok {
match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
add_field => [ "received_at", "%{@timestamp}" ]
add_field => [ "received_from", "%{host}" ]
}
syslog_pri { }
date {
match => ["timestamp",
"MMM dd HH:mm:ss",
"MMM d HH:mm:ss",
"MMM dd yyyy HH:mm:ss",
"MMM d yyyy HH:mm:ss"
]
}
}
output {
if [type] == "syslogucs" {
elasticsearch {
hosts => ["192.168.56.226:9200", "192.168.52.251:9200", "192.168.52.252:9200"]
index => ["syslogucs-%{+YYYY.MM}"]
}
}
}
If I go into Kibana is says it can't find the index pattern of "syslogucs-*" - can anyone help?
Thanks.