Logstash add date field to logs - logstash

My application produces logs, without a timestamp.
Is there a way in logstash to append timestamp to the logs on processing
something like,
mutate {
add_field => { "timestamp" => "%{date}" }
}

Logstash adds a #timestamp field by default. You don't need to set anything additional. Logstash will take the time an event is received and add the field for you.
For example if you try this command:
LS_HOME/bin/logstash -e 'input { stdin {} } output { stdout { codec => rubydebug } }'
You will see an automatically created #timestamp field in your result:
"#timestamp": "2015-07-13T17:41:13.174Z"
You can change the format and timezone using the date filter or you can match a timestamp of your event (e.g. a syslog timestamp) using other filters like grok or json.

Related

Logstash pipeline output does not create requested index

My output plugin is configured as follows:
output {
stdout { codec => rubydebug { metadata => true } }
elasticsearch {
hosts => ["elasticsearch:443"]
ssl => true
cacert => 'cacert.crt'
user => "logstash_internal"
password => "x-pack-test-password"
index => "logstash-ddo-%{+xxxx.ww}"
}
}
When I query elastic with:
GET /_cat/indices/logstash-*?v&s=index
I get the following:
health status index uuid pri rep docs.count docs.deleted store.size pri.store.size
green open logstash-ddo- oyMaZ1jeQPCOhI8YDXnbxw 1 1 78687 0 64.8mb 32.2mb
I would expected it to be for example:
logstash-ddo-2020-44
I have checked and re-checked the pipeline configuration file and I am out of ideas. Do you guys see anything?
Logstash does not report any errors. I'm on version 7.9.2 (dockerized)
To create an index based on the event's date logstash uses the date from the #timestamp field.
Since your index name is not getting the year and the week number, you are either removing or renaming the #timestamp field.
You need to keep the #timestamp field in your document, if you want to change its name, you can create a new field from it, but logstash needs the #timestamp field to create time based index.

Logstash : Unrecognized #timestamp value, setting current time to #timestamp, original in _#timestamp field

I have json log messages sent to logstash which looks like :
{"#timestamp":"2017-08-10 11:32:14.619","level":"DEBUG","logger_name":"application","message":"Request processed in 1 ms"}
And logstash configured with :
json {
source => "message"
}
date {
match => ["#timestamp", "yyyy-MM-dd HH:mm:ss.SSS"]
timezone => "Europe/Paris"
}
But I have this warning in the logs :
[2017-08-10T11:21:16,739][WARN ][logstash.filters.json ] Unrecognized #timestamp value, setting current time to #timestamp, original in _#timestamp field {:value=>"\"2017-08-10 11:20:34.527\""}
I tried different configurations, like adding quotes around the space, renaming the field with a mutate before the date filter (wich result with the same warning, and an error saying that the timestamp is missing), etc...
In the values stored in elastic search, the timestamp is the time the log was parsed and not the original (2/3 seconds after).
What am I missing ?
I think the problem is that the field in the source message is named #timestamp, just like the default.
We solved it by renaming the field in the source, add changing the config to :
date {
match => ["apptimestamp", "yyyy-MM-dd HH:mm:ss.SSS"]
timezone => "Europe/Paris"
}

logstash convert time to date time

I am using logstash to push data from filebeat to elasticsearch. My data has time as hh:mm:ss a (05:21:34 AM). I want to add today's date to it.
This is filter of logstash config
filter{
grok{ some grok pattern to get time}
date {
locale => "en"
match => ["time", "hh:mm:ss a"]
target => "#timestamp"
}
}
But data converted as 2016-01-01T05:21:34.000Z
How can I change it to 2016-10-14T05:21:34.000Z?
I think logstash is smart enough to use the current year (as you're seeing), but it's not defaulting the other fields.
You should make a new field with the full datetime string you want. Something like this should work between your grok and date:
grok { }
mutate {
add_field => { "datetime" => "%{+YYYY.MM.dd} %{time}" }
}
date { }
Be sure to change your date{} pattern to use the new datetime field and its format. If you don't want the datetime field after date{} is called, you can either use a metadata field instead, or remove_field as part of date{}.

Logstash to convert epoch timestamp

I'm trying to parse some epoch timestamps to be something more readable.
I looked around for how to parse them into a normal time, and from what I understand all I should have to do is something like this:
mutate
{
remove_field => [ "..."]
}
grok
{
match => { 'message' => '%{NUMBER:time}%{SPACE}%{NUMBER:time2}...' }
}
date
{
match => [ "time","UNIX" ]
}
An example of a message is: 1410811884.84 1406931111.00 ....
The first two values should be UNIX time values.
My grok works, because all of the fields show in Kibana with the expected values, and all the values fields I've removed aren't there so the mutate works too. The date section seems to do nothing.
From what I understand the match => [ "time","UNIX" ] should do what I want (Change the value of time to be a proper date format, and have it show on kibana as a field.) . So apparently I'm not understanding it.
The date{} filter replaces the value of #timestamp with the data provided, so you should see #timestamp with the same value as the [time] field. This is typically useful since there's some delay in the propagation, processing, and storing of the logs, so using the event's own time is preferred.
Since you have more than one date field, you'll want to use the 'target' parameter of the date filter to specify the destination of the parsed date, e.g.:
date {
match => [ "time","UNIX" ]
target => "myTime"
}
This would convert the string field named [time] into a date field named [myTime]. Kibana knows how to display date fields, and you can customize that in the kibana settings.
Since you probably don't need both a string a date version of the same data, you can remove the string version as part of the conversion:
date {
match => [ "time","UNIX" ]
target => "myTime"
remove_field => [ "time" ]
}
Consider also trying with UNIX_MS for milliseconds.
date {
timezone => "UTC"
match => ["timestamp", "UNIX_MS"]
target => "#timestamp"
}

How to add a new dynamic value(which is not there in input) to logstash output?

My input has timestamp in the format of Apr20 14:59:41248 Dataxyz.
Now in my output i need the timestamp in the below format:
**Day Month Monthday Hour:Minute:Second Year DataXYZ **. I was able to remove the timestamp from the input. But I am not quite sure how to add the new timestamp.
I matched the message using grok while receiving the input:
match => ["message","%{WORD:word} %{TIME:time} %{GREEDYDATA:content}"]
I tried using mutate add_field.but was not successful in adding the value of the DAY. add_field => [ "timestamp","%{DAY}"].I got the output as the word ´DAY´ and not the value of DAY. Can someone please throw some light on what is being missed.
You need to grok it out into the individual named fields, and then you can reference those fields in add_field.
So your grok would start like this:
%{MONTH:month}%{MONTHDAY:mday}
And then you can put them back together like this:
mutate {
add_field => {
"newField" => "%{mday} %{month}"
}
}
You can check with my answer, I think this very helpful to you.
grok {
match => { "message" => "%{TIMESTAMP_ISO8601:time} \[%{NUMBER:thread}\] %{LOGLEVEL:loglevel} %{JAVACLASS:class} - %{GREEDYDATA:msg}" }
}
if "Exception" in [msg] {
mutate {
add_field => { "msg_error" => "%{msg}" }
}
}
You can use custom grok patterns to extract/rename fields.
You can extract other fields similarly and rearrange/play arounnd with them in mutate filter. Refer to Custom Patterns for more information.

Resources