Code: Select all
curl -XGET 'http://localhost:9200/nagioslogserver/node/_search?size=2000'
{"took":1,"timed_out":false,"_shards":{"total":1,"successful":1,"failed":0},"hits":{"total":3,"max_score":1.0,"hits":[{"_index":"nagioslogserver","_type":"node","_id":"global","_score":1.0,"_source":{"config_inputs":[{"raw":"syslog {\r\n type => 'syslog'\r\n port => 5544\r\n}","name":"Syslog (Default)","active":"1"},{"raw":"tcp {\r\n type => 'eventlog'\r\n port => 3515\r\n codec => json {\r\n charset => 'CP1252'\r\n }\r\n}","name":"Windows Event Log (Default)","active":"1"},{"raw":"tcp {\r\n type => 'import_raw'\r\n tags => 'import_raw'\r\n port => 2056\r\n}","name":"Import Files - Raw (Default)","active":"1"},{"raw":"tcp {\r\n type => 'import_json'\r\n tags => 'import_json'\r\n port => 2057\r\n codec => json\r\n}","name":"Import Files - JSON (Default)","active":"1"},{"raw":"tcp {\r\n type => 'import_raw'\r\n tags => 'auditd'\r\n port => 2999\r\n}","name":"AuditD ","active":"1"}],"config_filters":[{"raw":"if [program] == 'apache_access' {\r\n grok {\r\n match => [ 'message', '%{COMBINEDAPACHELOG}']\r\n }\r\n date {\r\n match => [ 'timestamp', 'dd/MMM/yyyy:HH:mm:ss Z' ]\r\n }\r\n mutate {\r\n replace => [ 'type', 'apache_access' ]\r\n convert => [ 'bytes', 'integer' ]\r\n convert => [ 'response', 'integer' ]\r\n }\r\n}\r\n \r\nif [program] == 'apache_error' {\r\n grok {\r\n match => [ 'message', '\\[(?<timestamp>%{DAY:day} %{MONTH:month} %{MONTHDAY} %{TIME} %{YEAR})\\] \\[%{WORD:class}\\] \\[%{WORD:originator} %{IP:clientip}\\] %{GREEDYDATA:errmsg}']\r\n }\r\n mutate {\r\n replace => [ 'type', 'apache_error' ]\r\n }\r\n}","name":"Apache (Default)","active":"1"},{"raw":"if [severity] == 6 {\r\n drop { }\r\n}","name":"Syslog Info Drop","active":"1"},{"raw":"if \"auditd\" in [tags] {\r\n kv { }\r\n}","name":"Auditd Processer KV","active":"1"},{"raw":"if [program] == 'mountd' {\r\n drop { }\r\n}","name":"mountd drop filter","active":"1"},{"raw":"if [type] == 'syslog' {\r\n if [severity_label] == 'Debug' {\r\n drop { }\r\n }\r\n}","name":"syslog debug filter","active":"1"}],"config_outputs":[]}},{"_index":"nagioslogserver","_type":"node","_id":"b2733b10-233a-4593-9428-85145cd54c77","_score":1.0,"_source":{"last_updated":1486409328,"ls_version":"1.4.0","ls_release":140,"elasticsearch":{"status":"running","pid":"5001","message":"Search engine (elasticsearch) is running."},"logstash":{"status":"running","pid":"5529","message":"Log collector (logstash) is running."},"address":"10.0.103.180","hostname":"nagilgp01.dcri.duke.net"}},{"_index":"nagioslogserver","_type":"node","_id":"11fe29cc-9353-4cc1-a368-14a0b6977937","_score":1.0,"_source":{"last_updated":1486409329,"ls_version":"1.4.0","ls_release":140,"elasticsearch":{"status":"running","pid":"6308","message":"Search engine (elasticsearch) is running."},"logstash":{"status":"running","pid":"6420","message":"Log collector (logstash) is running."},"address":"10.136.132.107","hostname":"nagilgp02.dhe.duke.edu"}}]}}