Hi,
From the longtime, I am trying to work on Logstash and Kibana but my Logstash filter file not configured properly. Can anyone share his Weblogic logstash filter file.
I was using below one but it's not creating the index for msg_timestamp but creating for @timestamp, at the time of creation index in Kibana dashboard. @timestamp give the load time in the dashboard, not exact time when the error came in the file. ( real datetime required not load date).
filter {
if [message] !~ /^####/ {
drop {
}
}
grok {
match => { "message" => "\#\#\#\#\<%{DATA:msg_timestamp}\> \<%{DATA:msg_severity}\> \<%{DATA:msg_subsystem}\>%{GREEDYDATA:msg_details}" }
add_field => [ "received_at", "%{msg_timestamp}" ]
add_field => [ "received_from", "%{host}" ]
}
syslog_pri { }
date {
match => [ "msg_timestamp", "MMM d HH:mm:ss", "MMM dd HH:mm:ss" ]
}
}
Regards
San