Logstash data not reflecting in kibana

I am new to ELK stack and trying to setup one.

Filebeat is sending logs to logstash and logstash is successfully receiving it. Also, the index pattern nsa got reflected on kibana indices list( elk_server_ip:9200/_cat/indices).

But for nsa index pattern, not even one log has been shown in kibana which is present to remove server its been more than 30 minutes. following is the screen i am viewing

enter image description here

Please suggest where i am doing wrong. is logstash slow to pass data to kibana? is there any way to know if kibana is receiving the logs from logstash?

Following are my configuration files


- type: log
  enabled: true
    - /home/mahesh/Documents/refactor/nomi/unity/media/*.log

  enabled: true
  hosts: ["localhost:5044"]


input {
beats {
    port => 5044
    ssl => false

filter {
  grok {
    match => { "message" => "%{TIMESTAMP_ISO8601:timestamp}] %{LOGLEVEL:loglevel}\|%{GREEDYDATA:module}\|%{GREEDYDATA:content}" }
  date {
    locale => "en"
    match => [ "timestamp", "YYYY-MM-dd HH:mm:ss"]
    target => "@timestamp"
    timezone => "America/New_York"

output {
  elasticsearch {
    hosts => "elk_server_ip:9200"
    manage_template => false
    index => "nsa" 
  stdout { codec => rubydebug { metadata => true } }

Did you create an index pattern for NSA in Kibana? (Management tab)

@rugenl to my surprise, its working now, I got 90 hits..... seems like there is a delay from logstash to elasticsearch.

NSA index pattern status is yellow is this safe?

Yellow is safe to use, but there would be a reason, like missing replica shards. It depends on your cluster and index options.

Check for time, Kibana default is last 15 minutes, expand to last day, week, or month to find hiding events.

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.