Setting Up Filebeat on Windows Laptop for Centralized Log Collection

Hi everyone,

I’m setting up centralized log collection using Graylog 5.3 and Filebeat, and I wanted to check if I’m following best practices when configuring it on a Windows laptop. My current goal is to ship application and system logs from multiple laptops to our Graylog server over Beats input.

I’m particularly interested in recommendations for filtering or enriching logs before they reach Graylog. Should these tasks be handled upstream in Logstash, or within Graylog pipelines for better performance and maintainability?

Thanks in advance for any tips or feedback!

Hey @oliviabarn,

Graylog 5.3 is fairly old at this point so it would be worth upgrading to the latest release.

Most filtering such as forwarding only specific events, can be handled by the winlogbeat/filebeat configuration, it might be Logstash is not required. Enriching data can be handled within pipelines/rules on Graylog - assuming you have sized the Graylog cluster base on estimated ingestion and retention then performance should not be an issue.

Before starting the process I would recommend mapping out some use cases you want to achieve by ingesting Windows logs.

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.