Home > Operation and Maintenance > Linux Operation and Maintenance > How to use Logstash for log analysis in a Linux environment?

How to use Logstash for log analysis in a Linux environment?

WBOY
Release: 2023-07-31 12:09:12
Original
1743 people have browsed it

How to use Logstash for log analysis in a Linux environment?

Logstash is a powerful open source tool that is widely used to process and analyze various types of log data. It makes it simple to collect, filter, transform and send log data from different sources to various destinations. This article will introduce how to use Logstash for log analysis in a Linux environment and provide some common code examples.

1. Install and configure Logstash

Before you begin, please ensure that the Java runtime environment has been installed in the Linux environment. Then, follow the steps below to install and configure Logstash.

  1. Download the Logstash compressed package and extract it to the target folder:

    wget https://artifacts.elastic.co/downloads/logstash/logstash-7.10.2.tar.gz
    tar -xzf logstash-7.10.2.tar.gz
    Copy after login
  2. Enter the decompressed folder:

    cd logstash-7.10.2
    Copy after login
  3. Create a new configuration file logstash.conf and write the following content:

    input {
      # 配置输入源,如文件、网络等
      file {
        path => "/path/to/your/logfile.log"
        start_position => "beginning"
      }
    }
    
    filter {
      # 配置过滤器,根据需求进行过滤和转换
      grok {
        match => { "message" => "%{COMBINEDAPACHELOG}" }
      }
    }
    
    output {
      # 配置输出目的地,如Elasticsearch、文件等
      elasticsearch {
        hosts => ["localhost:9200"]
        index => "mylogs-%{+YYYY.MM.dd}"
      }
    }
    Copy after login

    It is worth noting that the above configuration file is just a simple example, you It can be modified and expanded accordingly according to your own needs.

  4. Start Logstash:

    bin/logstash -f logstash.conf
    Copy after login

    Ensure that Logstash starts successfully and check whether the log data is sent to the specified destination.

2. Logstash common configuration examples

The following are some commonly used Logstash configuration examples to achieve different functions and processing requirements.

a. Use regular expressions to extract key information

filter {
  grok {
    match => { "message" => "%{IP:client} %{WORD:method} %{URIPATHPARAM:request} %{NUMBER:bytes}" }
  }
}
Copy after login

The above configuration uses regular expressions to extract IP addresses, request methods, request paths and data in the logs Key information such as size.

b. Add additional fields

filter {
  mutate {
    add_field => { "environment" => "dev" }
  }
}
Copy after login

The above configuration adds an extra field named environment to each log record, and Set its value to dev.

c. Delete the specified field

filter {
  mutate {
    remove_field => [ "fieldname1", "fieldname2" ]
  }
}
Copy after login

The above configuration will remove the fields named fieldname1 and fieldname2 from each log Delete from the record.

d. Convert time format

filter {
  date {
    match => [ "timestamp", "yyyy-MM-dd HH:mm:ss" ]
  }
}
Copy after login

The above configuration converts the time string in the field named timestamp to the specified date format.

3. Conclusion

Logstash is a powerful tool that can help us collect, filter, convert and send log data in the Linux environment. This article introduces the installation and configuration steps of Logstash and provides some common configuration examples. I hope that through the introduction of this article, you can understand and master how to use Logstash for log analysis in a Linux environment.

The above is the detailed content of How to use Logstash for log analysis in a Linux environment?. For more information, please follow other related articles on the PHP Chinese website!

source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template