Hello there,
How do I enable the option to packetbeat with_vlans.
Can you help?
Hello there,
How do I enable the option to packetbeat with_vlans.
Can you help?
Hi, the with_vlans
option was added after our last release. We're working right now on releasing beta3, should come out in the next couple of days.
thanks for the reply
with_vlans: true will use my right in this way. beta3 released after
Beta3 is now available: https://www.elastic.co/downloads/beats/packetbeat
Thank you for the reply
How to enable with_vlans ?
[root@packtbeat ~]$packetbeat -version
packetbeat version 1.0.0-beta3
You need to add the option to the interfaces section, something like this:
interfaces:
device: eth0
with_vlans=true
not running
Oops, sorry, I meant with_vlans: true
, i.e. :
instead of =
.
What protocols do you want to monitor? In the screenshot I see some ICMP (which we Packetbeat doesn't support) and some DNS requests?
protocols:dns,http,mysql,mongodb,psql
Can you help?
Please try to run Packetbeat in foreground like this:
packetbeat -e -d "sniffer,publish"
And check from the output if packetbeat seems to be receiving packets and if it sends it to Elasticsearch.
hi,
eth3; fibre channel port
my packetbeat.yml:
#Sniffer
interfaces:
device: eth3
with_vlans: true
output:
[root@ntop ~]$ packetbeat -e -d "sniffer,publish"
geolite.go:61: INFO Loaded GeoIP data from: /usr/share/GeoIP/GeoIP.dat
output.go:80: INFO [ElasticsearchOutput] Using Elasticsearch [http://10.10.11.232:9200]
output.go:81: INFO [ElasticsearchOutput] Using index pattern [packetbeat-]YYYY.MM.DD
output.go:82: INFO [ElasticsearchOutput] Topology expires after 15s
output.go:84: INFO [ElasticsearchOutput] Insert events in batches. Flush interval is 1s. Bulk size is 10000.
publish.go:250: INFO Using elasticsearch to store the topology
publish.go:285: INFO Topology map refreshed every 10s
publish.go:211: DBG Add topology entry for ntop: [10.10.11.232 fe80::21c:c4ff:fedd:d9e0 fe80::200:c9ff:fecd:78dc]
sniffer.go:234: DBG BPF filter: tcp port 80 or tcp port 8080 or tcp port 8000 or tcp port 5000 or tcp port 8002 or tcp port 3306 or tcp port 6379 or tcp port 5432 or tcp port 9090 or tcp port 27017 or udp port 53 or port 11211 or (vlan and (tcp port 80 or tcp port 8080 or tcp port 8000 or tcp port 5000 or tcp port 8002 or tcp port 3306 or tcp port 6379 or tcp port 5432 or tcp port 9090 or tcp port 27017 or udp port 53 or port 11211))
sniffer.go:119: DBG Sniffer type: pcap device: eth3
sniffer.go:280: DBG Interrupted
sniffer.go:337: DBG Packet number: 1
"
"
"
sniffer.go:337: DBG Packet number: 194
sniffer.go:280: DBG Interrupted
sniffer.go:280: DBG Interrupted
sniffer.go:280: DBG Interrupted
sniffer.go:337: DBG Packet number: 195
sniffer.go:337: DBG Packet number: 196
sniffer.go:337: DBG Packet number: 197
sniffer.go:337: DBG Packet number: 198
sniffer.go:337: DBG Packet number: 199
sniffer.go:337: DBG Packet number: 200
sniffer.go:337: DBG Packet number: 201
sniffer.go:337: DBG Packet number: 202
sniffer.go:337: DBG Packet number: 203
sniffer.go:337: DBG Packet number: 204
sniffer.go:337: DBG Packet number: 205
sniffer.go:337: DBG Packet number: 206
sniffer.go:337: DBG Packet number: 207
publish.go:211: DBG Add topology entry for ntop: [10.10.11.232 fe80::21c:c4ff:fedd:d9e0 fe80::200:c9ff:fecd:78dc]
sniffer.go:280: DBG Interrupted
sniffer.go:280: DBG Interrupted
^Csniffer.go:280: DBG Interrupted
sniffer.go:342: INFO Input finish. Processed 207 packets. Have a nice day!
[root@ntop ~]$
© 2020. All Rights Reserved - Elasticsearch
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant logo are trademarks of the Apache Software Foundation in the United States and/or other countries.