Hi, just installed Graylog 3.1.0+aa5175e and it works great.
I’ve been dealing with a few issues related to sending DNS log with NXLOG. I’ve been searching for solutions on issue with empty mandatory "short_message" field but everything I tried was uneffective.
So, I switched to Packetbeat as everyone seems suggesting. The environment is Windows 2012r2 and Packetbeat is on the latest version. Its configuration file is approved by the verification command .\packetbeat.exe test config .\packetbeat.yml -e and it outputs a good Config OK
With this in my pocket, I created a new Graylog Beats input sitting on port 5046, with no TLS, but when I run it, in the log I see:
Actually I solved the problem. I’m writing the solution right here in the hope somebody would find it useful.
I found that the only way to have Packetbeat working with Graylog is to let it be run by Sidecar. So I needed to configure a new log collector manually (I found only winlogbeat, filebeat and nxlog template, despite on what I read on the website announcing version 3) and pushing this configuration:
Input is of Beats type. I needed also to configure a processing pipeline to fill the source and message fields that were sent null from packetbeat collectors. Everything seems to work with these two rules:
rule "Fill source field"
when
has_field("beats_type")
then
set_field("source", $message.packetbeat_collector_node_id);
end
rule "Fill message field"
when
has_field("beats_type")
then
set_field("message", $message.packetbeat_query);
end
All Packetbeat messages are pushed in their reserved Packetbeat DNS stream and the Pipeline is applied only on this stream.