John Mark Causing

System Administrator | Hosting Support Engineer

Bacolod City, Philippines

+639393497018

John Mark Causing

System Administrator | Hosting Support Engineer

Bacolod City, Philippines

+639393497018

Install logstash with the steps below or just use this guide in case it won’t let you to install via apt.

sudo apt-get update && sudo apt-get install logstash

Create your syslog.conf file.

input {
  tcp {
    port => 5000
    type => syslog
  }
  udp {
    port => 5000
    type => syslog
  }
}

filter {
  if [type] == "syslog" {
    grok {
      match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
      add_field => [ "received_at", "%{@timestamp}" ]
      add_field => [ "received_from", "%{host}" ]
    }
    date {
      match => [ "syslog_timestamp", "MMM  d HH:mm:ss", "MMM dd HH:mm:ss" ]
    }
  }
}

output {
  elasticsearch {
	hosts => ["localhost:9200"]
	user => "elastic"
 	password => "password88123818"
        index => "syslog-%{+YYYY.MM.dd}"
  }
  stdout { codec => rubydebug }
}

We got the config codes below from this example configuration. We are using port 5000 to ingest/input logs to logstash, we connect to our elasticsearch port 9200 and login details for our elastic search.

Start logstash binary using that syslog config file.

[email protected]:/etc/logstash# /usr/share/logstash/bin/logstash -f syslog.conf
Using bundled JDK: /usr/share/logstash/jdk
OpenJDK 64-Bit Server VM warning: Option UseConcMarkSweepGC was deprecated in version 9.0 and will likely be removed in a future release.

[INFO ] 2021-07-17 14:48:21.774 [[main]<tcp] tcp - Starting tcp input listener {:address=>"0.0.0.0:5000", :ssl_enable=>false}
[INFO ] 2021-07-17 14:48:22.134 [Agent thread] agent - Pipelines running {:count=>1, :running_pipelines=>[:main], :non_running_pipelines=>[]}
[INFO ] 2021-07-17 14:48:22.139 [[main]<udp] udp - Starting UDP listener {:address=>"0.0.0.0:5000"}
[INFO ] 2021-07-17 14:48:22.383 [[main]<udp] udp - UDP listener started {:address=>"0.0.0.0:5000", :receive_buffer_bytes=>"106496", :queue_size=>"2000"}

To run your syslog.conf automatically, you can save it inside the conf.d folder.

/etc/logstash/conf.d
[email protected]:/etc/logstash/conf.d# ls
syslog.conf

Forwarding Syslog Messages to Logstash via TCP Connections

Insert the codes below to /etc/rsyslog.d/50-default.conf

*.*                         @@127.0.0.1:5000
Then restart rsyslog.service
sudo systemctl restart rsyslog.service

Setup Kibana Index pattern for our syslog events

Let’s test it!

Stop a service like nginx then look for that event syslog then go to Kibana -> Discover and find that event.

So now we were able to set up the Logstash Syslog event ingestion where rsyslog service is forwarding the log data to our Logstash service.