Hello.
I have following loglines:
Aug 22 10:19:48 s1435 postfix/smtp[17330]: 28C1328124A4: to=jacobsd@gmail.com, relay=smtp2.google.com[194.14.9.134]:25, delay=1100, delays=0/1100/0.13/0.26, dsn=2.0.0, status=sent (250 2.0.0 Ok: queued as 4FDD469A41_B7D1CA4F)
My filter is:
input {
file {
path => "/etc/logstash/conf.d/myfile.log"
start_position => "beginning"
}
}filter {
grok {
match => { "message" => "^%{SYSLOGTIMESTAMP}\s%{DATA}<%{DATA:email}>%{GREEDYDATA}" }
}
}
Is there a way to use this syslogtimestamp as a @timestamp to use the upper-right time filtering capability in Kibana?