Movatterモバイル変換


[0]ホーム

URL:


Loading
  1. Elastic Docs/
  2. Reference/
  3. Ingestion tools/
  4. Elastic integrations

Miniflux integration

Version1.0.0 (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Elastic
Ingestion method(s)API
Minimum Kibana version(s)9.0.0
8.17.4

TheMiniflux integration allows you to extract data from Miniflux. Miniflux is an RSS feed reader.

Use the Miniflux integration to extract RSS feed content. Then visualize that data in Kibana, create alerts to notify you if something goes wrong.

For example, if you wanted to be notified for a new feed entry you could set up an alert.

This integration collects the following logs:

  • Entries - Retrieves feed entries from the Miniflux application.

You need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.

Each data stream collects different kinds of logs data, which may require dedicated permissions to be fetched and may vary across operating systems. Details on the permissions needed for each data stream are available in the Logs reference.

Before sending logs to Elastic from your Miniflux application (self-hosted or SaaS), you must create a Miniflux API key by followingMiniflux's documentation

After you've configured your device, you can set up the Elastic integration.

This is thefeed_entry dataset.

Example
{    "@timestamp": "2025-05-13T01:30:56.695Z",    "agent": {        "ephemeral_id": "3221ee48-0fe2-46e1-a34b-07909a00265e",        "id": "ba6fa1eb-0b15-4523-83b2-12b2b68add1c",        "name": "elastic-agent-34183",        "type": "filebeat",        "version": "8.18.0"    },    "data_stream": {        "dataset": "miniflux.feed_entry",        "namespace": "27883",        "type": "logs"    },    "ecs": {        "version": "8.17.0"    },    "elastic_agent": {        "id": "ba6fa1eb-0b15-4523-83b2-12b2b68add1c",        "snapshot": false,        "version": "8.18.0"    },    "event": {        "agent_id_status": "verified",        "category": [            "web"        ],        "dataset": "miniflux.feed_entry",        "ingested": "2025-05-13T01:30:59Z",        "kind": "enrichment",        "type": [            "info"        ]    },    "input": {        "type": "cel"    },    "miniflux": {        "changed_at": "2023-09-02T20:30:13.118Z",        "content": "<p></p>\n\n<h1>Exploit for Code Injection in Vmware Spring Framework CVE-2022-22965</h1>\n<p>2023-09-02 | CVSS 7.5 </p>\n\n\n\n\n\nCopy\nDownload\nSource\n<a href=\"#share-url\">Share</a>\n\n<pre><code>## https://sploitus.com/exploit?id=5C9561BE-D9BB-58D0-8E51-09DDD257BC72\n# Spring4Shell: CVE-2022-22965 RCE\n\n## Java Spring framework RCE vulnerability\nThese vulnerabilities affects a component &#34;Spring Core&#34; —  the heart of the framework \n\n**Current conditions for vulnerability:-**\n\n- JDK 9+\n- A vulnerable version of the Spring Framework (&lt;5.2 | 5.2.0-19 | 5.3.0-17)\n- Apache Tomcat as a server for the Spring application, packaged as a WAR\n- A dependency on the spring-webmvc and/or spring-webflux components of the Spring Framework\n\n## The exploit\n\n```python\nuser@attacker:~$ ./exploit.py --help\nusage: exploit.py [-h] [-f FILENAME] [-p PASSWORD] [-d DIRECTORY] url\n\nSpring4Shell RCE Proof of Concept\n\npositional arguments:\n  url                   Target URL\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -f FILENAME, --filename FILENAME\n                        Name of the file to upload (Default tomcatwar.jsp)\n  -p PASSWORD, --password PASSWORD\n                        Password to protect the shell with (Default: thm)\n  -d DIRECTORY, --directory DIRECTORY\n                        The upload path for the file (Default: ROOT)\n```\n\n```python\nuser@attacker:~$ ./exploit.py http://MACHINE_IP/\nShell Uploaded Successfully!\n\n\n# OUTPUT= Your shell can be found at: http://MACHINE_IP/tomcatwar.jsp?pwd=thm&amp;cmd=whoami\n```</code> </pre>\n\n",        "created_at": "2023-09-02T20:17:02.689Z",        "feed": {            "allow_self_signed_certificates": false,            "category": {                "hide_globally": false,                "id": 25000,                "title": "2-Production",                "user_id": 4426            },            "checked_at": "2025-05-02T12:25:58.524Z",            "crawler": true,            "disable_http2": false,            "disabled": false,            "feed_url": "https://sploitus.com/rss",            "fetch_via_proxy": false,            "hide_globally": false,            "icon": {                "external_icon_id": "dadd95d716e12dbdc58fabdd0f38f48e8d7eab88",                "feed_id": 355593,                "icon_id": 60476            },            "id": 355593,            "ignore_http_cache": false,            "next_check_at": "0001-01-01T00:00:00.000Z",            "no_media_player": false,            "ntfy_enabled": false,            "ntfy_priority": 0,            "parsing_error_count": 0,            "pushover_enabled": false,            "pushover_priority": 0,            "site_url": "https://sploitus.com/rss",            "title": "Sploitus.com Exploits RSS Feed",            "user_id": 4426        },        "feed_id": 355593,        "hash": "fab2dc0ad7ba85e40595d197da245cb2602ce93c6a2c2deca340ce909c9a4a13",        "id": 83721716,        "published_at": "2023-09-02T10:41:05.000Z",        "reading_time": 1,        "starred": true,        "status": "read",        "title": "Exploit for Code Injection in Vmware Spring Framework exploit",        "url": "https://sploitus.com/exploit?id=5C9561BE-D9BB-58D0-8E51-09DDD257BC72&utm_source=rss&utm_medium=rss",        "user_id": 4426    },    "related": {        "hash": [            "fab2dc0ad7ba85e40595d197da245cb2602ce93c6a2c2deca340ce909c9a4a13"        ]    },    "tags": [        "forwarded",        "miniflux-feed_entry"    ],    "url": {        "domain": "sploitus.com",        "full": "https://sploitus.com/exploit?id=5C9561BE-D9BB-58D0-8E51-09DDD257BC72&utm_source=rss&utm_medium=rss",        "original": "https://sploitus.com/exploit?id=5C9561BE-D9BB-58D0-8E51-09DDD257BC72&utm_source=rss&utm_medium=rss",        "path": "/exploit",        "query": "id=5C9561BE-D9BB-58D0-8E51-09DDD257BC72&utm_source=rss&utm_medium=rss",        "scheme": "https"    }}
Exported fields
FieldDescriptionType
@timestampDate/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.date
data_stream.datasetThe field can contain anything that makes sense to signify the source of the data. Examples includenginx.access,prometheus,endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value.event.dataset should have the same value asdata_stream.dataset. Beyond the Elasticsearch data stream naming criteria noted above, thedataset value has additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.namespaceA user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field withdefault. If no value is used, it falls back todefault. Beyond the Elasticsearch index naming criteria noted above,namespace value has the additional restrictions: * Must not contain- * No longer than 100 charactersconstant_keyword
data_stream.typeAn overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future.constant_keyword
input.typeType of filebeat input.keyword
miniflux.authorAuthor of the feed entrykeyword
miniflux.changed_atdate
miniflux.comments_urlkeyword
miniflux.contentkeyword
miniflux.created_atdate
miniflux.enclosureskeyword
miniflux.feed.allow_self_signed_certificatesboolean
miniflux.feed.apprise_service_urlsboolean
miniflux.feed.blocklist_ruleskeyword
miniflux.feed.category.hide_globallyboolean
miniflux.feed.category.idlong
miniflux.feed.category.titlekeyword
miniflux.feed.category.user_idlong
miniflux.feed.checked_atdate
miniflux.feed.cookiekeyword
miniflux.feed.crawlerboolean
miniflux.feed.descriptionkeyword
miniflux.feed.disable_http2boolean
miniflux.feed.disabledboolean
miniflux.feed.etag_headerkeyword
miniflux.feed.feed_urlkeyword
miniflux.feed.fetch_via_proxyboolean
miniflux.feed.hide_globallyboolean
miniflux.feed.icon.external_icon_idkeyword
miniflux.feed.icon.feed_idlong
miniflux.feed.icon.icon_idlong
miniflux.feed.idlong
miniflux.feed.ignore_http_cacheboolean
miniflux.feed.keeplist_ruleskeyword
miniflux.feed.last_modified_headerkeyword
miniflux.feed.next_check_atdate
miniflux.feed.no_media_playerboolean
miniflux.feed.ntfy_enabledboolean
miniflux.feed.ntfy_priorityinteger
miniflux.feed.ntfy_topickeyword
miniflux.feed.parsing_error_countinteger
miniflux.feed.parsing_error_messagekeyword
miniflux.feed.passwordkeyword
miniflux.feed.proxy_urlkeyword
miniflux.feed.pushover_enabledboolean
miniflux.feed.pushover_priorityinteger
miniflux.feed.rewrite_ruleskeyword
miniflux.feed.scraper_ruleskeyword
miniflux.feed.site_urlkeyword
miniflux.feed.titlekeyword
miniflux.feed.urlrewrite_ruleskeyword
miniflux.feed.user_agentkeyword
miniflux.feed.user_idlong
miniflux.feed.usernamekeyword
miniflux.feed.webhook_urlkeyword
miniflux.feed_entry_splitkeyword
miniflux.feed_idlong
miniflux.hashkeyword
miniflux.idlong
miniflux.published_atdate
miniflux.reading_timeinteger
miniflux.share_codekeyword
miniflux.starredboolean
miniflux.statuskeyword
miniflux.tagskeyword
miniflux.titlekeyword
miniflux.urlkeyword
miniflux.user_idlong

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.

Sample screenshot
Changelog
VersionDetailsMinimum Kibana version
1.0.0Enhancement (View pull request)
Release package as GA.

Enhancement (View pull request)
Add dashboard.
9.0.0
8.17.4
0.3.0Enhancement (View pull request)
Useterminate processor instead offail processor to handle agent errors.
9.0.0
8.17.4
0.2.1Bug fix (View pull request)
Fix minor spelling mistakes.
9.0.0
8.17.4
0.2.0Enhancement (View pull request)
Update Kibana constraint to support 9.0.0.

Enhancement (View pull request)
Adduri_parts pipeline parsing on fieldminiflux.url.
9.0.0
8.17.4
0.1.0Enhancement (View pull request)
Initial draft of the package
8.17.4

[8]ページ先頭

©2009-2026 Movatter.jp