Skip to content

Configuration of LogStash (and Filebeat) for Analytics treatment.

Notifications You must be signed in to change notification settings

guillain/LogStash-conf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

LogStash-conf

Configuration of LogStash for Analytics treatment.

Provide set of configuration files for:

  • Logstash data collect and treatment
  • Filebeat template to transfert your logs to logstash

Design

Best Pratice for real usage

Repartition by Virtual Machine 0/ Source

  • Install: filebeat, syslog (UDP), JSON/TCP
  • What: Dedicated VM where the data source is/come from

1/ Data collection

  • Install: logstash
  • What: Collect all source, index and push it to elasticsearch

2/ Storage

  • Install: elasticsearch
  • What: Store and index all data

3/ Interface

  • Install: kibana
  • What: Provide web interface for analytics reports

Installation

Target path is done for standard package deployment done via package management tool (as yum, apt...). So if your settings are not in '/etc/x' thanks to adapt to your environment.

Filebeat

cp filebeat/* /etc/filebeat/

Elasticsearch

cp elasticsearch/*yml /etc/elasticsearch/

Logstash

\cp -fr logstash/* /etc/logstash/

Configuration files

That's preconfigured files to be used like that. No change is ok for run but some configuration adaption are require for production usage.

Elasticsearch

Global file to manage the elasticsearch indexer according to the logstash and filebeat env to set.

LogStash

Lot of filters are ready and just you need to adapt your input (connectors) according to your systems.

Input

  • 001-syslog-input.conf --> UDP/5000
  • 002-beats-input.conf --> TCP/5044
  • 004-bot-input.conf --> TCP/5055

Filter

Most of them with based on the patterns included in the logstash-patterns-core distribution:

  • 001-syslog-input.conf
  • 002-beats-input.conf
  • 100-syslog-filter.conf
  • 101-apache-filter.conf
  • 102-audit-filter.conf
  • 103-login-filter.conf
  • 104-bot-filter.conf
  • 105-redis-filter.conf
  • 106-aws-filter.conf
  • 107-cisco-filter.conf
  • 108-mongodb-filter.conf
  • 109-nagios-filter.conf
  • 110-java-filter.conf
  • 111-haproxy-filter.conf
  • 112-ruby-filter.conf
  • 113-netscreen-filter.conf
  • 114-sharewall-filter.conf
  • 115-postgresql-filter.conf
  • 116-rails-filter.conf
  • 117-bro-filter.conf
  • 118-cucmcdr-filter.conf

Output

Elasticsearch only at this time... to be continued

  • 300-elasticsearch-output.conf
  • 399-debug-output.conf

FileBeat

Provide log template to quickly integarte on your host where the data should come.

  • syslog
  • audit
  • redis
  • apache
  • apache-other-vhost
  • apache-error
  • dpkg
  • cucm-cdr
  • cucm-cmr
  • bot: based on JSON and dynamic index

Cisco CDR

Thanks to Damienetwork and its website

I've not integrated the mecanism to get the CDR/CMR from the CUCM, up to you to add your choice.

ToDo list

  • Install logstash-filter-translate in Logstash
  • Import JSON in elasticsearch and kibana (to find in the Damien's site)

GeoIP

Thanks to:manicas and its article

GeoIP is included in apache and syslog conf...

  • To continue in other configuration
  • Or can declared as generic field under 'clientip' name

HowTo

Principle:

  • Dearchive the package
  • Copy the content in your logstash configuration folder
  • Adapt the conf to your elasticseaerch server in the 3xx output
  • Download the GeoIP database
  • Install the CUCM CDR/CDR features

Example on Logstash server

git clone https://github.com/guillain/LogStash-conf
cp LogStash-conf/logtash/* /etc/logstash/conf.d/
cd /etc/logstash/
curl -O "http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz"
gunzip GeoLiteCity.dat.gz
/opt/logstash/bin/plugin install logstash-filter-translate
service logstash restart

Example on CentOS server to collect with Filebeat

yum install filebeat
git clone https://github.com/guillain/LogStash-conf
mv /etc/filebeat/filebeat.yml /etc/filebeat/filebeat.yml.orig
cp LogStash-conf/filebeat/filebeat.yml /etc/filebeat/filebeat.yml
service filebeat restart

Configuration validated

Input

  • syslog
  • filebeat
    • syslog
    • auditlog
    • apache
    • CUCM CDR/CRM
  • logstash
  • NodeJS bot
  • Python bot

Filter

  • syslog
  • apache
  • audit
  • login
  • bot

Ouput

  • logstash
  • elasticsearch
  • redis

Have fun :)

About

Configuration of LogStash (and Filebeat) for Analytics treatment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published