Packetbeat Configuration Example
Ship Network Data with Packetbeat
Packetbeat is a network package analyser used to capture network traffic. It can be used to extract useful fields of information from network transactions before shipping them to one or more destinations, including Logstash. This is useful for troubleshooting and detecting performance hits.
Logs
Install Integration
Install
To get started first follow the steps below:
- Install packetbeat (opens in a new tab)
- Root access
- Verify the required port @logstash.sslPort is open
Older versions can be found here: packetbeat 7 (opens in a new tab), packetbeat 6 (opens in a new tab), packetbeat 5 (opens in a new tab)
Locate the configuration file
/etc/packetbeat/packetbeat.yml
Configure Packetbeat
Packetbeat needs to be configured to select the network interface from which to capture the traffic.
On Windows, you must also download and install a packet sniffing library, such as Npcap (opens in a new tab), that implements the libpcap interfaces.
Once installed you can then run the following command to list the available network interfaces:
PS C:\Program Files\Packetbeat> .\packetbeat.exe devices
0: \Device\NPF_{113535AD-934A-452E-8D5F-3004797DE286} (Intel(R) PRO/1000 MT Desktop Adapter)
On Linux: Packetbeat supports capturing all messages sent or received by the server on which Packetbeat is installed. For this, use any as the device:
packetbeat.interfaces.device: any
On OS X, capturing from the any device does not work. You would typically use either lo0 or en0 depending on which traffic you want to capture.
In this example, there is only one network card, with the index 0, installed on the system. If there are multiple network cards, remember the index of the device you want to use for capturing the traffic.
Modify the device line to point to the index of the device:
packetbeat.interfaces.device: 0
There's also a full example configuration file called packetbeat.full.yml that shows all the possible options.
Configure protocols
In the protocols section, configure the ports on which Packetbeat can find each protocol. If you use any non-standard ports, add them here. Otherwise, the default values should do just fine.
packetbeat.protocols.dns:
ports: [53]
include_authorities: true
include_additionals: true
packetbeat.protocols.http:
ports: [80, 8080, 8081, 5000, 8002]
packetbeat.protocols.memcache:
ports: [11211]
packetbeat.protocols.mysql:
ports: [3306]
packetbeat.protocols.pgsql:
ports: [5432]
packetbeat.protocols.redis:
ports: [6379]
packetbeat.protocols.thrift:
ports: [9090]
packetbeat.protocols.mongodb:
ports: [27017]
packetbeat.protocols.cassandra:
ports: [9042]
Configure Output
We will be shipping to Logstash so that we have the option to run filters before the data is indexed.
Comment out the elasticsearch output block.
## Comment out elasticsearch output
#output.elasticsearch:
# hosts: ["localhost:9200"]
# ================================== Outputs ===================================
# ------------------------------ Logstash Output -------------------------------
output.logstash:
hosts: ["@logstash.host:@logstash.sslPort"]
loadbalance: true
ssl.enabled: true
Validate Configuration
.\@beatname.exe test config -c @beatname.yml
If the yml file is invalid, @beatname will print a description of the error. For example, if the
output.logstash
section was missing, @beatname would print no outputs are defined, please define one under the output section
Start Packetbeat
Ok, time to start ingesting data!
sudo service packetbeat start
How to diagnose no data in Stack
If you don't see data appearing in your stack after following this integration, take a look at the troubleshooting guide for steps to diagnose and resolve the problem or contact our support team and we'll be happy to assist.