I would like to start by parsing a simple csv logfile. I dont even require headers assigned.
Right now I just get the entire line in message.
I also need to understand how to include only logs with a specific tag (set in the client filebeat yml file)
Any help for getting started would be highly appreciated.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
tags: ["mytag"] --
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
But still all of my csv data end up in the message field, when looking in Kibana. Obviously I am missing something. But what?
I tried using the tags filter instead of type. To me is doesn't really matter. I just need to separate my different source machines.
But still all of my csv data end up in the message field, when looking in Kibana. Obviously I am missing something. But what?
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
"No cached mapping for this field"
I tried refreshing fields from the managememt> index page.
Do I need to create a json custom file too? Instructions appreciated :-)
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
Can I simply define new field names + their type directly in the beats-templates.json? I really don't want to much complexity, before I understand the basics.
Another thing:
What is the purpose of having three files (input/filter/output) for Logstash parsing? Is it mandatory or can I consolidate everything into one file?
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.