前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >ELK日志收集

ELK日志收集

作者头像
OvO我是肉排菌呀
修改2021-03-14 17:15:07
5130
修改2021-03-14 17:15:07
举报
文章被收录于专栏:Docker记录Docker记录

环境

  • 操作系统
代码语言:javascript
复制
Ubuntu18.04或者CentOS7.6
  • ELK
代码语言:javascript
复制
elasticsearch-7.6.0-amd64.deb
filebeat-7.6.0-amd64.deb
kibana-7.6.0-amd64.deb
logstash-7.6.0.deb
logstash-7.6.0.zip
  • Java

安装过程

Ubuntu

代码语言:javascript
复制
wget https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-7.6.0-amd64.deb
sudo dpkg -i elasticsearch-7.6.0-amd64.deb
sudo /bin/systemctl enable elasticsearch.service
sudo systemctl start elasticsearch.service

Kibana和Filebeat和上面一样

Logstash dpkg安装失败所以使用zip解压,然后进如./bin目录下启动

CentOS

下载4个软件的压缩包解压,都是进入./bin目录下启动。

使用压缩包解压得到的kibana和elasticsearch不能运行在root权限下,需要新建非root用户,并将kibana和elasticsearch的拥有者改为新建用户。

Logstash 脚本配置

以收集nginx日志为例,在logstash的文件夹下新建pipelines.conf文件,填入下列内容:

代码语言:javascript
复制
input {
    beats {
        port => "5044"
    }
}
# The filter part of this file is commented out to indicate that it is
# optional.
filter {
    grok {
        match => { "message" => "%{COMBINEDAPACHELOG}" }
    }
    geoip {
        source => "clientip"
    }
}
output {
    elasticsearch {
        hosts => [ "localhost:9200" ]
            index => "nginx-access-%{+YYYY.MM.dd}"
    }
}

Filebeat脚本配置

同样以收集nginx日志为例:

代码语言:javascript
复制
###################### Filebeat Configuration Example #########################
# This file is an example configuration file highlighting only the most common
# options. The filebeat.reference.yml file from the same directory contains all the
# supported options with more comments. You can use it as a reference.
#
# You can find the full configuration reference here:
# https://www.elastic.co/guide/en/beats/filebeat/index.html
# For more available modules and options, please see the filebeat.reference.yml sample
# configuration file.
#=========================== Filebeat inputs =============================
filebeat.inputs:
# Each - is an input. Most options can be set at the input level, so
# you can use different inputs for various configurations.
# Below are the input specific configurations.
- type: log
 # Change to true to enable this input configuration.
 enabled: true
 # Paths that should be crawled and fetched. Glob based paths.
 paths:
    - /var/log/nginx/*.log
 #- c:\programdata\elasticsearch\logs\*
 # Exclude lines. A list of regular expressions to match. It drops the lines that are
 # matching any regular expression from the list.
 #exclude_lines: ['^DBG']
 # Include lines. A list of regular expressions to match. It exports the lines that are
 # matching any regular expression from the list.
 #include_lines: ['^ERR', '^WARN']
 # Exclude files. A list of regular expressions to match. Filebeat drops the files that
 # are matching any regular expression from the list. By default, no files are dropped.
 #exclude_files: ['.gz$']
 # Optional additional fields. These fields can be freely picked
 # to add additional information to the crawled log files for filtering
 #fields:
 #  level: debug
 #  review: 1
 tags: ["nginx"]
#Second
#- type: log
 # Change to true to enable this input configuration.
 #enabled: true
 # Paths that should be crawled and fetched. Glob based paths.
 #paths:
 #- /var/log/secure
 #- c:\programdata\elasticsearch\logs\*
 # Exclude lines. A list of regular expressions to match. It drops the lines that are
 # matching any regular expression from the list.
 #exclude_lines: ['^DBG']
 # Include lines. A list of regular expressions to match. It exports the lines that are
 # matching any regular expression from the list.
 #include_lines: ['^ERR', '^WARN']
 # Exclude files. A list of regular expressions to match. Filebeat drops the files that
 # are matching any regular expression from the list. By default, no files are dropped.
 #exclude_files: ['.gz$']
 # Optional additional fields. These fields can be freely picked
 # to add additional information to the crawled log files for filtering
 #fields:
 #  level: debug
 #  review: 1
 #tags: ["ssh"]
 ### Multiline options
 # Multiline can be used for log messages spanning multiple lines. This is common
 # for Java Stack Traces or C-Line Continuation
 # The regexp Pattern that has to be matched. The example pattern matches all lines starting with [
 #multiline.pattern: ^\[
 # Defines if the pattern set under pattern should be negated or not. Default is false.
 #multiline.negate: false
 # Match can be set to "after" or "before". It is used to define if lines should be append to a pattern
 # that was (not) matched before or after or as long as a pattern is not matched based on negate.
 # Note: After is the equivalent to previous and before is the equivalent to to next in Logstash
 #multiline.match: after
#============================= Filebeat modules ===============================
filebeat.config.modules:
 # Glob pattern for configuration loading
 path: ${path.config}/modules.d/*.yml
 # Set to true to enable config reloading
 reload.enabled: false
 # Period on which files under path should be checked for changes
 #reload.period: 10s
#==================== Elasticsearch template setting ==========================
setup.template.settings:
 index.number_of_shards: 1
 #index.codec: best_compression
 #_source.enabled: false
#================================ General =====================================
# The name of the shipper that publishes the network data. It can be used to group
# all the transactions sent by a single shipper in the web interface.
#name:
# The tags of the shipper are included in their own field with each
# transaction published.
#tags: ["service-X", "web-tier"]
# Optional fields that you can specify to add additional information to the
# output.
#fields:
#  env: staging
#============================== Dashboards =====================================
# These settings control loading the sample dashboards to the Kibana index. Loading
# the dashboards is disabled by default and can be enabled either by setting the
# options here or by using the `setup` command.
#setup.dashboards.enabled: false
# The URL from where to download the dashboards archive. By default this URL
# has a value which is computed based on the Beat name and version. For released
# versions, this URL points to the dashboard archive on the artifacts.elastic.co
# website.
#setup.dashboards.url:
#============================== Kibana =====================================
# Starting with Beats version 6.0.0, the dashboards are loaded via the Kibana API.
# This requires a Kibana endpoint configuration.
setup.kibana:
 # Kibana Host
 # Scheme and port can be left out and will be set to the default (http and 5601)
 # In case you specify and additional path, the scheme is required: http://localhost:5601/path
 # IPv6 addresses should always be defined as: https://[2001:db8::1]:5601
 #host: "localhost:5601"
 # Kibana Space ID
 # ID of the Kibana Space into which the dashboards should be loaded. By default,
 # the Default Space will be used.
 #space.id:
#============================= Elastic Cloud ==================================
# These settings simplify using Filebeat with the Elastic Cloud (https://cloud.elastic.co/).
# The cloud.id setting overwrites the `output.elasticsearch.hosts` and
# `setup.kibana.host` options.
# You can find the `cloud.id` in the Elastic Cloud web UI.
#cloud.id:
# The cloud.auth setting overwrites the `output.elasticsearch.username` and
# `output.elasticsearch.password` settings. The format is `<user>:<pass>`.
#cloud.auth:
#================================ Outputs =====================================
# Configure what output to use when sending the data collected by the beat.
#-------------------------- Elasticsearch output ------------------------------
#output.elasticsearch:
 # Array of hosts to connect to.
 #hosts: ["localhost:9200"]
 # Optional protocol and basic auth credentials.
 #protocol: "https"
 #username: "elastic"
 #password: "changeme"
#----------------------------- Logstash output --------------------------------
output.logstash:
 # The Logstash hosts
 hosts: ["localhost:5044"]
 # Optional SSL. By default is off.
 # List of root certificates for HTTPS server verifications
 #ssl.certificate_authorities: ["/etc/pki/root/ca.pem"]
 # Certificate for SSL client authentication
 #ssl.certificate: "/etc/pki/client/cert.pem"
 # Client Certificate Key
 #ssl.key: "/etc/pki/client/cert.key"
#================================ Processors =====================================
# Configure processors to enhance or manipulate events generated by the beat.
processors:
  - add_host_metadata: ~
  - add_cloud_metadata: ~
  - add_docker_metadata: ~
  - add_kubernetes_metadata: ~
#================================ Logging =====================================
# Sets log level. The default log level is info.
# Available log levels are: error, warning, info, debug
#logging.level: debug
# At debug level, you can selectively enable logging only for some components.
# To enable all selectors use ["*"]. Examples of other selectors are "beat",
# "publish", "service".
#logging.selectors: ["*"]
#============================== X-Pack Monitoring ===============================
# filebeat can export internal metrics to a central Elasticsearch monitoring
# cluster.  This requires xpack monitoring to be enabled in Elasticsearch.  The
# reporting is disabled by default.
# Set to true to enable the monitoring reporter.
#monitoring.enabled: false
# Sets the UUID of the Elasticsearch cluster under which monitoring data for this
# Filebeat instance will appear in the Stack Monitoring UI. If output.elasticsearch
# is enabled, the UUID is derived from the Elasticsearch cluster referenced by output.elasticsearch.
#monitoring.cluster_uuid:
# Uncomment to send the metrics to Elasticsearch. Most settings from the
# Elasticsearch output are accepted here as well.
# Note that the settings should point to your Elasticsearch *monitoring* cluster.
# Any setting that is not set is automatically inherited from the Elasticsearch
# output configuration, so if you have the Elasticsearch output configured such
# that it is pointing to your Elasticsearch monitoring cluster, you can simply
# uncomment the following line.
#monitoring.elasticsearch:
#================================= Migration ==================================
# This allows to enable 6.7 migration aliases
#migration.6_to_7.enabled: true

完成上述工作后就可以启动ELK了

外部访问

  1. 安装nginx
  2. 生成登陆密码

社区版kibana登陆时没有身份验证,为了保证服务器安全需要在nginx上设置身份认证。因此需要先生成用户名和密码

需要先安装apache的一个套件用于生成用户名密码

代码语言:javascript
复制
sudo apt-get install apache2-utils

设置用户名和密码

代码语言:javascript
复制
sudo htpasswd -c /etc/nginx/passwd/kibana.passwd username

之后会要求输入密码

3. 修改/etc/nginx/nginx.conf脚本

在http{}中加入下面代码:

代码语言:javascript
复制
server {
        listen       你的PORT http2;
        listen       [::]:你的PORT http2;
        server_name  你的IP;
        root         /usr/share/nginx/html;
                access_log  /var/log/nginx/kibana_access.log;
                error_log   /var/log/nginx/kibana_error.log;
        # Load configuration files for the default server block.
        include /etc/nginx/default.d/*.conf;
        auth_basic "Kibana Auth";#由于我没有x-pack,所以在访问kibana时设置了身份认证,保证服务器安全
        auth_basic_user_file /etc/nginx/passwd/kibana.passwd;
        location / {
                proxy_pass http://127.0.0.1:5601;#访问你的端口时,会自动代理到127.0.0.1的5601端口
        }
    }

4. 重启nginx

代码语言:javascript
复制
systemctl restart nginx.service

转载地址

https://chenggang-jia.com/studylist/ELK

本文系转载,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文系转载前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • 环境
  • 安装过程
    • Ubuntu
      • CentOS
      • Logstash 脚本配置
      • Filebeat脚本配置
      • 外部访问
      • 转载地址
      相关产品与服务
      Elasticsearch Service
      腾讯云 Elasticsearch Service(ES)是云端全托管海量数据检索分析服务,拥有高性能自研内核,集成X-Pack。ES 支持通过自治索引、存算分离、集群巡检等特性轻松管理集群,也支持免运维、自动弹性、按需使用的 Serverless 模式。使用 ES 您可以高效构建信息检索、日志分析、运维监控等服务,它独特的向量检索还可助您构建基于语义、图像的AI深度应用。
      领券
      问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档