All the Beats agents get sent to port 5043 (beats.conf), and that's working fine, but I can't find the index pattern to create the syslog-* index.
Instead I find this new index (which is the index in the beats.conf file):
Oh wow sorry i was exhausted yesterday i just put you in trouble, i was meaning to filter in types in the ouptut file not the input one.
Just remove the condition your input.conf should look like this :
input{
tcp { XXXX }
udp { XXXX }
}
And the output file is where you sort events to be indexed :
output{
if [type] == "foo" {
elasticsearch {
hosts => "localhost:9200"
index => "foologs"
}
}
}
I haven't been working with ELK for very long so it would really help if you can detail the explanation/answer a little more.
I just used separates files to make it more clear that logstash is processing files depending on their names and this is important to know since you were using multiple files but did not took care of their processing order for logstash.
If you wish to you could just use one big file but it makes it easier to configure with separates files.
Sorry for misleading you yesterday. Let me know if this solution works.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.