# automatically inherited from the Elasticsearch output configuration, so if you* # Elasticsearch output are accepted here as well. # Uncomment to send the metrics to Elasticsearch. # Set to true to enable the monitoring reporter.* This requires xpack monitoring to be enabled in Elasticsearch. # filebeat can export internal metrics to a central Elasticsearch monitoring* # At debug level, you can selectively enable logging only for some components.* # Available log levels are: error, warning, info, debug* # Configure processors to enhance or manipulate events generated by the beat.* #ssl.certificate: "/etc/pki/client/cert.pem"* # Certificate for SSL client authentication* # List of root certificates for HTTPS server verifications* # Optional protocol and basic auth credentials.* # Configure what output to use when sending the data collected by the beat.* # You can find the `cloud.id` in the Elastic Cloud web UI.* # The cloud.id setting overwrites the `` and* # These settings simplify using filebeat with the Elastic Cloud ().* # ID of the Kibana Space into which the dashboards should be loaded. # In case you specify and additional path, the scheme is required: # IPv6 addresses should always be defined as: #host: "localhost:5601"* # Scheme and port can be left out and will be set to the default (http and 5601)* # This requires a Kibana endpoint configuration.* # Starting with Beats version 6.0.0, the dashboards are loaded via the Kibana API.*
# versions, this URL points to the dashboard archive on the * # has a value which is computed based on the Beat name and version.
# The URL from where to download the dashboards archive. # options here or by using the `setup` command.* # the dashboards is disabled by default and can be enabled either by setting the* # These settings control loading the sample dashboards to the Kibana index. # Optional fields that you can specify to add additional information to the* # The tags of the shipper are included in their own field with each* # all the transactions sent by a single shipper in the web interface.* # The name of the shipper that publishes the network data. # Filebeat will choose the paths depending on your OS.* # Period on which files under path should be checked for changes* # Set to true to enable config reloading* # Glob pattern for configuration loading* # Note: After is the equivalent to previous and before is the equivalent to to next in Logstash* # that was (not) matched before or after or as long as a pattern is not matched based on negate.* It is used to define if lines should be append to a pattern* # Match can be set to "after" or "before". # Defines if the pattern set under pattern should be negated or not. The example pattern matches all lines starting with [*
# The regexp Pattern that has to be matched. # for Java Stack Traces or C-Line Continuation* # Multiline can be used for log messages spanning multiple lines. # to add additional information to the crawled log files for filtering* # are matching any regular expression from the list. # matching any regular expression from the list.* # Paths that should be crawled and fetched. # Change to true to enable this input configuration.* # Below are the input specific configurations.*
# you can use different inputs for various configurations.* Most options can be set at the input level, so* # For more available modules and options, please see the sample*
# You can find the full configuration reference here:* The file from the same directory contains all the* # This file is an example configuration file highlighting only the most common* Below is the configuration that I have configured on filebeat.yml : # Filebeat Configuration Example #* I succeed to forward the mongodb logs using the mongodb module for filebeat.