HI Ali , i have FortiAnalyzer and want to ingest the log to security onion , could i send it directly or should i have syslog vm between FAZ and security onion . what is the best scenario to do this . thanks for your help
Thank you for the information video, can you suggest if in case i have multiple pods running and i am capturing logs of all application pods on one common persistent storage mounted /var/log what could be possible input string
Can you pls help whats the rest of the filter in the fortigate.conf? I cant see the whole code. mutate{ remove_field => ["@timestamp", "host", "@version",................................
Hi Ali, thank you for this video. Right now, we are facing issue to integrate log of Fortigate using Logstash+Elasticsearch+Kibana. We have an issue with the grok from Logstash to create indexing in Elasticsearch.
Why is that required? I'm new to elastic but I understand from their documents that they have Fortinet integration so I would expect them to be able to parse that without me doing all that stuff manually?
That's right, you can use the Fortinet integration and it does a great job. This is a demo on how to install Logstash, you can also use it to ingest and enrich the Fortinet logs with other data from other sources.
i have the error: Failed to perform request {:message=>"PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target"
Hello, thank you for the tutorial, it was fine until I had to start the logstash service, from then on I no longer received the logs, in my case from a Cisco switch, even though I also gave permissions to the certificate and I still do not receive the logs. I runt again the command /usr/share/logstash/bin/logstash -f /etc/logstash/conf.d/cisco.conf -r and there I receive the logs , I don't know what I did wrong, but it doesn't work normally for me
Hi Ali. Thank´s for the video. At this moment I am getting an error which does not allow me to continue. The port is occupied by java, therefore when starting the logstash it tells me "The address is already being used (bind) port: 5144". (Address already in use - bind)
@@jamaaberdihna1076 I setup Syslog on the firewall to send to a specific UDP port on Logstash server, and on Logstash I open that port. It should start sending
Nice Vid Ali - very helpful - Question - can Logstash conect securely to Elasticsearch using an API key instead of sending a username and password thru the .conf file? perhaps configuring such API key in the logstash.yml or placing it in the filexyz.conf file used to connect to elasticsearch. Generate the API key in Kibana with logstash-user role and index permissions to publish such logs from logstash into Elasticsearch. Thanks for your previous response to making such video series in Windows servers. - Cheers
Nice Vid Ali Can you make this Elastic, Kibana, Logstash Videos for Windows Server 2019/2022 or Windows 10?; and perhaps ingest data from an SQL Database server; if at all possible. Thank You.
Thank you! The command is starting Logstash from the source binary /usr/share/logstash/bin/logstash and then specifying the configuration file with -f that tells Logstash where to get the data from (input plugin), filters the events (filter plugin) and send to an Elasticsearch output (output plugin)
@@AliYounesGo4IT Could You please tell me what is in the mutate{ remove_field as it is not shown on video? ( ["@timestamp","host","@version"......... Thanks!
Hello Ali, I'm new to ELK and wanted to ask if you've ran into the problem I am encountering or if you can provide guidance. I am experiencing the issue you encountered at the end of the video where the logstash service stops and stops presenting data on Kibana. I've attempted to restart the logstash services and modify permissions for logstash, but I continue to encounter an issue. I ran a journalctl with logstash.service and notice the error below. Would you be able to provide guidance on this? [INFO ][logstash.config.source.local.configpathloader] No config files found in path {:path=>"/etc/logstash/conf.d/*"} [ERROR][logstash.config.sourceloader] No configuration found in the configured sources.
I never encountered this error, but can you double check the pipelines.yml file if it has the path to the conf file, and that there are no syntax errors in the file as well Hope that helps
Hello Ali - @ 9:18 - how do you know that is the format? can you explain a bit more how you identify such a format?
This helped a LOT. Thank you, sir.
HI Ali , i have FortiAnalyzer and want to ingest the log to security onion , could i send it directly or should i have syslog vm between FAZ and security onion . what is the best scenario to do this . thanks for your help
Thank you for the information video, can you suggest if in case i have multiple pods running and i am capturing logs of all application pods on one common persistent storage mounted /var/log what could be possible input string
Can you pls help whats the rest of the filter in the fortigate.conf? I cant see the whole code.
mutate{
remove_field => ["@timestamp", "host", "@version",................................
you can use this remove_field => ["@timestamp", "path", "host", "@version", "log", "event"]
@@abdenourguellati3124 thank you so much!
which one is better depends on performance, send log via filebeat or via logstash?
logs are not coming to elastic search from syslog server. we done as "enroll in fleet" way? can u pls help me with this issue ?
how we can get the log from more thaan 1 network device forti ?
Hi Ali, thank you for this video. Right now, we are facing issue to integrate log of Fortigate using Logstash+Elasticsearch+Kibana. We have an issue with the grok from Logstash to create indexing in Elasticsearch.
What is the issue?
Why is that required? I'm new to elastic but I understand from their documents that they have Fortinet integration so I would expect them to be able to parse that without me doing all that stuff manually?
That's right, you can use the Fortinet integration and it does a great job. This is a demo on how to install Logstash, you can also use it to ingest and enrich the Fortinet logs with other data from other sources.
What can I do if I don’t want to define the hosts for fortinet?
because I want to send the logs from multiple fortinet FW
Can I remove hosts line?
can you check and work with opnsense as well?
I will look into it!
@@AliYounesGo4IT ok great thanks sir, do you have linkedin'?
i have the error:
Failed to perform request {:message=>"PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target"
is the issue fixed? I am also getting the same error
This is very helpful thank you !!
Glad it was helpful!
Hello, thank you for the tutorial, it was fine until I had to start the logstash service, from then on I no longer received the logs, in my case from a Cisco switch, even though I also gave permissions to the certificate and I still do not receive the logs. I runt again the command /usr/share/logstash/bin/logstash -f /etc/logstash/conf.d/cisco.conf -r and there I receive the logs , I don't know what I did wrong, but it doesn't work normally for me
Sorry I had port 514, I watched the video again to listen to your comments and I solved it, thanks
Hi, it is possible to write SNMP input plugin or it is hard work?
I will try that and make a video!
Great! Many thanks for this Video
Hi Ali. Thank´s for the video. At this moment I am getting an error which does not allow me to continue. The port is occupied by java, therefore when starting the logstash it tells me "The address is already being used (bind) port: 5144". (Address already in use - bind)
I think that happened to me once, Logstash was already running, maybe try to stop all Logstash processes and try again (run: ps -aux | grep logstash)
High quality content :)
Keep up the good work
+1 sub
thanks a lot bro. it very useful. Can you explain more about create index for firewall log?
Will work on that, thanks!
When I run logstash I get this error no configuration found in the configured source
I can think of the path to the .conf file, make sure that it is the full path, example: /etc/logstash/conf.d/example.conf
I resolve this problem how u generate logs with firewall my firewall is empty
@@jamaaberdihna1076 I setup Syslog on the firewall to send to a specific UDP port on Logstash server, and on Logstash I open that port. It should start sending
كل الشكر و التقدير على هدا العمل الجميل شكرا اخي
Nice one, continue good work
Muy buen trabajo, te felicito 👏
Could you demo how to use fortigate agent on ELK?
I will do that soon!
Thank you
Can you please do cisco routers and switches integration
Nice Vid Ali - very helpful - Question - can Logstash conect securely to Elasticsearch using an API key instead of sending a username and password thru the .conf file? perhaps configuring such API key in the logstash.yml or placing it in the filexyz.conf file used to connect to elasticsearch. Generate the API key in Kibana with logstash-user role and index permissions to publish such logs from logstash into Elasticsearch. Thanks for your previous response to making such video series in Windows servers. - Cheers
Great video, tnx! But why you use this primitive Putty instead let's say... MobaXTerm or another handy client?
I'm glad you like the video!
Putty works Ok, I will look into MobaXTerm!
Nice Vid Ali
Can you make this Elastic, Kibana, Logstash Videos for Windows Server 2019/2022 or Windows 10?; and perhaps ingest data from an SQL Database server; if at all possible.
Thank You.
I would like to see data from DB being pipelined with logstash and loaded into Elasticsearch 8.2.2
Great video
thank u.
it was Grate and useful
Hi man, thanks for the video it's excellent but can you pls give me more explanation about the command in min 7:30 I didn't get it
Thank you!
The command is starting Logstash from the source binary /usr/share/logstash/bin/logstash and then specifying the configuration file with -f that tells Logstash where to get the data from (input plugin), filters the events (filter plugin) and send to an Elasticsearch output (output plugin)
Perfect. Thanks!
wonderfull video
شكرا علي استفدة منك. لعمل log في الشركة شكرا جزيلا. حبذ. لو. تركزلنا على fortigate. و logstash.
Very nice. Thank you. Esselamu Aleykum.
Hi, This is very helpful thank you but It would be much better if you could upload the config file as well.
Wonderful, thank you sir very informative
match => {"message" => "%{SYSLOG5424PRI}%{GREEDY$} is truncated from the video, the window size is hide the rest.
match => {"message" => "%{SYSLOG5424PRI}%{GREEDYDATA:message}" }
@@AliYounesGo4IT Could You please tell me what is in the mutate{ remove_field as it is not shown on video? ( ["@timestamp","host","@version".........
Thanks!
@@Lukaszorr remove_field => ["@timestamp", "path", "host", "@version", "log", "event"]
Hello Ali,
I'm new to ELK and wanted to ask if you've ran into the problem I am encountering or if you can provide guidance.
I am experiencing the issue you encountered at the end of the video where the logstash service stops and stops presenting data on Kibana. I've attempted to restart the logstash services and modify permissions for logstash, but I continue to encounter an issue. I ran a journalctl with logstash.service and notice the error below. Would you be able to provide guidance on this?
[INFO ][logstash.config.source.local.configpathloader] No config files found in path {:path=>"/etc/logstash/conf.d/*"}
[ERROR][logstash.config.sourceloader] No configuration found in the configured sources.
I never encountered this error, but can you double check the pipelines.yml file if it has the path to the conf file, and that there are no syntax errors in the file as well
Hope that helps
@@AliYounesGo4IT Thank you! I was missing the ca path and fingerprint for Logstash. All good now!
hi Roberto i face the same issue could you provide me how to solved it