I am really interested in using the Beats forwarders from Elastic to send 
logs to Graylog as I have used Beats in ELK stacks previously.

I am curious as to what the beats forwarders configuration should be. I am 
used to using Logstash to parse logs before sending to Elasticsearch so I 
am wondering how the Graylog Beats input works? Is the data sent directly 
to Elasticsearch so the forwarder output should be Elasticsearch. I ask 
this as I noticed a comment on the plugin from Joschi saying that Logstash 
is the correct output.

If this is a working forwarder for an ELK stack what needs to change for 
Graylog?

filebeat:
  prospectors:
    -
      paths:
        - /var/log/auth.log
        - /var/log/syslog
      #  - /var/log/*.log

      input_type: log

      document_type: syslog

  registry_file: /var/lib/filebeat/registry

output:
  logstash:
    hosts: ["172.31.31.4:5044","172.31.23.200:5044"]
    # configure logstash plugin to loadbalance events between the logstash 
instances
    loadbalance: true

    bulk_max_size: 1024

    tls:
      certificate_authorities: 
["/etc/pki/tls/certs/logstash-node2fwd.crt","/etc/pki/tls/certs/logstash-forwarder.crt"]

shipper:

logging:
  files:
    rotateeverybytes: 10485760 # = 10MB


-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/4e90a272-4890-41cd-b169-40b7dff69189%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to