Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Kibana plugin to view, search & live tail log events

License

NotificationsYou must be signed in to change notification settings

sivasamyk/logtrail

Repository files navigation

Github All ReleasesKibana 7.9.2Licensemaintenance-status

This plugin is no longer maintained. Please use the built-intail logs feature in Kibana.

LogTrail is a plugin for Kibana to view, analyze, search, and tail log events from multiple hosts in realtime with DevOps friendly interface inspired byPapertrail.

Events

Features

  • View, analyze, and search log events from a centralized interface
  • Clean & simple DevOps friendly interface
  • Live tail
  • Filter aggregated logs by hosts and program
  • Quickly seek to logs based on time
  • Supports highlighting of search matches
  • Supports multiple Elasticsearch index patterns each with different schemas
  • Can be extended by adding additional fields to log event
  • Color coding of messages based on field values
  • Powerful search usingLucene query syntax

Installation

  • Prerequisites
    • Download and install Elasticsearch and Kibana
    • Logtrail is supported and tested with Kibana 6.x and 5.x
  • Install logtrail plugin (requires a restart of Kibana after install)
    • Kibana 7.9.2 :./bin/kibana-plugin install https://github.com/sivasamyk/logtrail/releases/download/v0.1.31/logtrail-7.9.2-0.1.31.zip
    • Kibana 5.6.5 :./bin/kibana-plugin install https://github.com/sivasamyk/logtrail/releases/download/v0.1.23/logtrail-5.7.9.2.1.23.zip
    • Other versions :https://github.com/sivasamyk/logtrail/releases
  • Kibana requires an exact match of the plugin version to the Kibana version. If you can't find the logtrail plugin release for a Kibana release, follow the instructionshere to update the Kibana version in your logtrail plugin archive.
  • ReferLogtrail Config Examples Repo for sample configurations for syslog, Java app, Kubernetes logs.

Configuration

  • Logtrail can be configured by editing the following fields present inlogtrail.json file located inside./plugins/logtrail directory.
  • default_index - Elasticsearch index where the syslog events are stored (default: logstash-*)
  • default_time_range_in_days - Default time range in days to search when time is not specified using Seek button.Example: A value of 30 means logtrail will search only in logs from the last 30 days unless time is specified using the Seek button.A value of 0 means logtrail will search in all available logs by default.
  • display_timezone - Timezone to display the timestamp in Event Viewer. e.g.America/Los_Angeles. The default value oflocal will use the timezone of the browser. The time specified inSeek To popup will always use browser timezone.
  • display_timestamp_format - Format to display the timestamp in Event Viewer. For list of valid value referhere
  • default_search - if specified, this will be applied as default search text while launching logtrail. The value can be any search text. e.g.ssh - shows all logs withssh in the message field. orlog_level:SEVERE - shows all logs wherelog_level field isSEVERE. The field name should be a valid field in the Elasticsearch document. The default search field is the field mapped tomessage.
  • fields - Edit this parameter to map the event fields in ES to logtrail fields
    • timestamp - maps to @timestamp field inserted by logstash. This will be used for querying internally. Logtrail recommends @timestamp to be stored in UTC in ES.
    • hostname - hostname from where the events were received. Also used by hostname filter. The hostname field should be of typekeyword. For more info check outHostname field need to be of type keyword
    • program - program that generated this event.
    • message - actual event message. This field will be used by search.
  • Example: If the event fields names are @timestamp, host, process, message the mapping should be
"mapping" : {"timestamp" :"@timestamp","hostname" :"host","program":"process","message":"message"    }
  • By default each line displayed in the events view is of format:display_timestamp hostname program:message
  • message_format - Used to add additional fields to be shown for log event. For more details referAdding additional fields
  • keyword_suffix - Specifies the keyword suffix to be appended for hostname & program fields. Set it to empty string ("") to not append any suffix. If not specified (undefined) logtrail will appendkeyword.
  • color_mapping - Color code messages based on field values. For more details referColor coding messages
  • Any changes inlogtrail.json require a restart of Kibana
  • Logtrail can readlogtrail.json configuration from Elasticsearch instead of the filesystem. This will be useful when sharing the same configuration across multiple installations. For more info referLoad Logtrail configuration from Elasticsearch
  • Referlogtrail-config-examples repo for sample configurations
  • Logs & Events from Windows, Java, Python, PHP, Perl, Ruby, Android, Docker, .Net can be shipped using the syslog protocol.
  • Beats/Fluentd can also be used to ship events to ES and fields can be mapped using thefields parameter inlogtrail.json

[8]ページ先頭

©2009-2025 Movatter.jp