Hi,
I have installed the winlogbeat 5.4 on a Windows Server 2016 machine. The servie is started. I have configured the ELK server this server is also running fine.
output.logstash:
The Logstash hosts
hosts: ["192.168.0.13:5044"]
Now I want to have a new indices in Kibana. So I configured as above the output via logstash.
This is now my logstash input /output configuration. How I have to do that now with the output. It doesn't work at the moment. I don't recieve anything at Kibana. I have also already tried "if [type] == "winlogbeat" but this is also not working.
input {
# file {
# path => "/tmp/in.log"
# type => "logfile" # a type to identify those logs (will need this later)
# start_position => "beginning"
# }
syslog {
port => 5514
type => "syslog"
}
udp {
type => "pfsense"
port => 5140
}
beats {
type => "winlogbeat"
port => 5044
}
udp {
type => "syslog"
port => 5515
}
}
output {
# file {
# path => "/tmp/out.log"
# }
if [type] == "beats" {
elasticsearch {
hosts => "localhost:9200"
index => "logstash-eventlog-%{YYYY.mm.dd}" }
} else {
elasticsearch {
hosts => "localhost:9200"
index => "logstash-%{+YYYY.MM.dd}"
}
}
# if [@metadata][cthostmeta] == "ELKSTACK" {
# file {
# codec => rubydebug { metadata => true}
# path => "/tmp/logstash_out.log"
# }
# }
}
Thanks for any help with that.
Best Regards,
Marc