3.Logstash 入门教程 -配置案例

3.Logstash 入门教程 -配置案例

介绍一个详细案例,讲述如何配置读取Apache日志,Syslog并根据自定义条件进行过滤和输出。

 

手工输入并解析数据

LS中可以通过Filter针对数据进行切片切块等操作,解析,装换,组装等等。。

input { stdin { } } #控制台输入

filter {
  grok { #通过GROK来自动解析APACHE日志格式
    match => { "message" => "%{COMBINEDAPACHELOG}" }
  }
  date {#通过Date过滤器来自动识别日期格式。
    match => [ "timestamp" , "dd/MMM/yyyy:HH:mm:ss Z" ]
  }
}

output {
  elasticsearch { host => localhost } #输出到ES中。
  stdout { codec => rubydebug } #输出到控制台
}

启动LS:bin/logstash -f logstash-filter.conf

并在控制台输入:

127.0.0.1 - - [11/Dec/2013:00:01:45 -0800] "GET /xampp/status.php HTTP/1.1" 200 3891 "http://cadenza/xampp/navi.php" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:25.0) Gecko/20100101 Firefox/25.0"

 可以看到输出结果为:

{
        "message" => "127.0.0.1 - - [11/Dec/2013:00:01:45 -0800] \"GET /xampp/status.php HTTP/1.1\" 200 3891 \"http://cadenza/xampp/navi.php\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:25.0) Gecko/20100101 Firefox/25.0\"",
     "@timestamp" => "2013-12-11T08:01:45.000Z",
       "@version" => "1",
           "host" => "cadenza",
       "clientip" => "127.0.0.1",
          "ident" => "-",
           "auth" => "-",
      "timestamp" => "11/Dec/2013:00:01:45 -0800",
           "verb" => "GET",
        "request" => "/xampp/status.php",
    "httpversion" => "1.1",
       "response" => "200",
          "bytes" => "3891",
       "referrer" => "\"http://cadenza/xampp/navi.php\"",
          "agent" => "\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:25.0) Gecko/20100101 Firefox/25.0\""
}

 看到结果了吧,完成了两个操作

1.LS使用grok自动解析了日志格式,

2.针对timestamp进行Date格式识别,并复制给了@timestamp字段。

 

再进一步,从文件中输入并解析数据

input {
  file { #通过Input配置,从文件中读取数据。
    path => "/tmp/access_log"  #日志文件位置
    start_position => "beginning" 
	#是否从头部开始读取。
	#Logstash启动后,会在系统中记录一个隐藏文件,记录处理过的行号,
	#当进行挂掉,重新启动后,根据该行号记录续读。
	#所以start_position只会生效一次。
  }
}

filter {
  if [path] =~ "access" {#当路径包含access时,才会执行以下处理逻辑
    mutate { replace => { "type" => "apache_access" } }
    grok {
      match => { "message" => "%{COMBINEDAPACHELOG}" }
    }
  }else if [path] =~ "error" { #IF-ElSE 配置方式。
    mutate { replace => { type => "apache_error" } }
	#使用Mutate 替换type的值为“apache_error”
  } else {
    mutate { replace => { type => "random_logs" } }
  }
  date {
    match => [ "timestamp" , "dd/MMM/yyyy:HH:mm:ss Z" ]
  }
}

output {
  elasticsearch {
    host => localhost
  }
  stdout { codec => rubydebug }
}

 

再来看个案例:

output {
  if [type] == "apache" {
    if [status] =~ /^5\d\d/ { #如果status状态为5xx,发送给nagios。
      nagios { ...  }
    } else if [status] =~ /^4\d\d/ {#如果是4xx,发送到elasticSearch
      elasticsearch { ... }
    }
    statsd { increment => "apache.%{status}" } #所有数据给statsd
  }
}

 处理SysLog案例:

处理SysLog案例:
input {
  tcp {
    port => 5000   #读取TCP端口
    type => syslog #数据类型
  }
  udp {
    port => 5000   #读取UDP端口
    type => syslog #数据类型
  }
}

filter {
  if [type] == "syslog" {
    grok { #解析日志格式。
      match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
      add_field => [ "received_at", "%{@timestamp}" ] #添加字段 
      add_field => [ "received_from", "%{host}" ]     #添加字段
    }
    syslog_pri { }
    date {  #日期格式处理,这里匹配了两种不同的日期格式。
      match => [ "syslog_timestamp", "MMM  d HH:mm:ss", "MMM dd HH:mm:ss" ]
    }
  }
}

output { #数据输出。
  elasticsearch { host => localhost }
  stdout { codec => rubydebug }
}

 

启动服务:

bin/logstash -f logstash-syslog.conf

发送测试数据:

telnet localhost 5000
Dec 23 12:11:43 louis postfix/smtpd[31499]: connect from unknown[95.75.93.154]
Dec 23 14:42:56 louis named[16000]: client 199.48.164.7#64817: query (cache) 'amsterdamboothuren.com/MX/IN' denied
Dec 23 14:30:01 louis CRON[619]: (www-data) CMD (php /usr/share/cacti/site/poller.php >/dev/null 2>/var/log/cacti/poller-error.log)
Dec 22 18:28:06 louis rsyslogd: [origin software="rsyslogd" swVersion="4.2.0" x-pid="2253" x-info="http://www.rsyslog.com"] rsyslogd was HUPed, type 'lightweight'.

 查看结果:

{
                 "message" => "Dec 23 14:30:01 louis CRON[619]: (www-data) CMD (php /usr/share/cacti/site/poller.php >/dev/null 2>/var/log/cacti/poller-error.log)",
              "@timestamp" => "2013-12-23T22:30:01.000Z",
                "@version" => "1",
                    "type" => "syslog",
                    "host" => "0:0:0:0:0:0:0:1:52617",
        "syslog_timestamp" => "Dec 23 14:30:01",
         "syslog_hostname" => "louis",
          "syslog_program" => "CRON",
              "syslog_pid" => "619",
          "syslog_message" => "(www-data) CMD (php /usr/share/cacti/site/poller.php >/dev/null 2>/var/log/cacti/poller-error.log)",
             "received_at" => "2013-12-23 22:49:22 UTC",
           "received_from" => "0:0:0:0:0:0:0:1:52617",
    "syslog_severity_code" => 5,
    "syslog_facility_code" => 1,
         "syslog_facility" => "user-level",
         "syslog_severity" => "notice"
}

 

你可能感兴趣的:(logstash,elasticsearch,ELK)