Hi,
Thanks for reading,
So I'm very new to this, a few work hours in.
I'm looking to be able to visualise my syslogs from a growing hardware security platform.
I have got the basics working...
Hardware > FluentD > elastic > kibana (GREAT !)
But during this process I want to be able to do stats on the 'message' part of the syslog,
Here is the json which fluentd sends to elastic
{
"_index": "logstash-2017.06.30",
"_type": "fluentd",
"_id": "AVz5DKN2eY2OqXmjH7Vv",
"_version": 1,
"_score": 1,
"_source": {
"host": "DEVICE",
"ident": "kernel",
"message": "[WAN_IN-default-D]IN=pppoe0 OUT=pppoe0 MAC= SRC=99.99.99.99 DST=77.77.77.77 LEN=44 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=57919 DPT=990 WINDOW=65535 RES=0x00 SYN URGP=0 MARK=0x65000000 ",
"@timestamp": "2017-06-30T13:49:04+01:00"
},
"fields": {
"@timestamp": [
1498826944000
]
}
}
I'm unsure if I should be doing some config at the fluentd level, or elastic
Or do I just ignore this, and do the processing in Kibana?
Essentially I want to do the stats on what is in the 'message'
Any help, pointers much appreciated
Regards
ZT