Hello,
sorry to bother you all. and sorry for any "lack of information" on my sides..
I'm running ELK stalk to index logs from syslog Fortinet Analyzer, all of my "fields" are currentely STRING except a few exception ...
heres my config file :
`"10-network_log.conf" 36L, 513C 26,3 All
input {
file {
path => ["/var/log/network.log"]
start_position => "beginning"
type => "syslog"
}
}
filter{
grok {
match => [
"message",
"%{TIMESTAMP_ISO8601:logtimestamp} %{GREEDYDATA:kv}"
]
remove_field => ["message"]
}
kv {
source => "kv"
field_split => " "
value_split => "="
}
date {
match => ["logtimestamp", "ISO8601"]
locale => "en"
remove_field => ["logtimestamp"]
}
geoip{
source =>"dstip"
database =>"/opt/logstash/GeoLiteCity.dat"
}
}`
I need to change it so I can do a "scripted field" later to "see actual bandwith usage" and might as well do other change later... using this : doc['rcvdbyte'].value + doc['sentbyte'].value
Im running latest version of the ELK stack.
Kibana 4.4.1 for all that matters.
Please help, I dont want to mess all my stuff, and to be honest.. Documentation is awsome! BUT I would like to have something ready to eat.. I learn way faster that way .. plus its sort of a production environnement ( actualy its an IMPORTANT POC ) ...
Actual indices :
actual mapping exemple :
wget http://localhost:9200/_mapping?pretty=1; cat _mapping?pretty=1 |grep -A10 -B10 rcvdbyte
wget http://localhost:9200/_mapping?pretty=1; cat _mapping?pretty=1 |grep -A10 -B10 sentbyte
"rcvdbyte" : {
"type" : "string",
"norms" : {
"enabled" : false
},
"fielddata" : {
"format" : "disabled"
},
"fields" : {
"raw" : {
"type" : "string","format" : "disabled"
same goes for sentbyte