ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Setting up an ELK Logging Server

    IT Discussion
    elk digital ocean droplet ubuntu elasticsearch kibana logstash
    6
    32
    11.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      scottalanmiller
      last edited by

      Okay, got derailed the other day. Working on this more now. DigitalOcean has a guide to setting up LogStash Forwarder on CentOS 7 that I am going through now. Already tried their old CentOS 6 guide, not knowing that there was an updated one, and it didn't work. So seeing if I have better luck with this one. The CentOS 6 guide does not work because OpenSSL has changed.

      1 Reply Last reply Reply Quote 0
      • S
        scottalanmiller
        last edited by

        The error that you might encounter is...

        2015/03/07 13:08:40.349662 Connecting to [x.x.x.x]:5000 (dny-lnx-log)
        2015/03/07 13:08:40.357296 Failed to tls handshake with x.x.x.x x509: certificate is valid for , not dny-lnx-log
        

        Where x.x.x.x is your IP address.

        1 Reply Last reply Reply Quote 0
        • S
          scottalanmiller
          last edited by scottalanmiller

          @scottalanmiller said:

          2015/03/07 13:08:40.349662 Connecting to [x.x.x.x]:5000 (dny-lnx-log)
          2015/03/07 13:08:40.357296 Failed to tls handshake with x.x.x.x x509: certificate is valid for , not dny-lnx-log

          Still does not work after using the CentOS 7 instructions. Am I doing something wrong or is no one else actually testing this? Going to test on Ubuntu.

          References for what is actually going wrong...

          https://github.com/elasticsearch/logstash-forwarder/issues/221
          https://github.com/elasticsearch/logstash-forwarder/issues/221#issuecomment-48390920
          http://serverfault.com/questions/633681/logstash-forwarder-is-throwing-ssl-errors

          1 Reply Last reply Reply Quote 0
          • S
            scottalanmiller
            last edited by

            Tested CentOS 7 on CloudatCost, same issues. No surprise there.

            1 Reply Last reply Reply Quote 0
            • S
              scottalanmiller
              last edited by

              Getting a little stuck on this one. No matter what configuration I use, the same error. I think that I am using the right configurations that people show on StackOverflow and GitHub but I keep getting the same errors or nearly the same.

              1 Reply Last reply Reply Quote 0
              • S
                scottalanmiller
                last edited by

                Here is my current SSL config file...

                # cat ssl.cnf
                [req] 
                distinguished_name = req_distinguished_name
                x509_extensions = v3_req
                prompt = no
                
                [req_distinguished_name]
                C = US
                ST = NY
                L =  Piffard
                O = NTG
                CN = *
                
                [v3_req]
                subjectKeyIdentifier = hash
                authorityKeyIdentifier = keyid,issuer
                basicConstraints = CA:TRUE
                subjectAltName = @alt_names
                
                [alt_names]
                DNS.1 = *
                DNS.2 = *.*
                DNS.3 = *.*.*
                DNS.4 = *.*.*.*
                DNS.5 = *.*.*.*.*
                DNS.6 = *.*.*.*.*.*
                DNS.7 = *.*.*.*.*.*.*
                IP.1 = x.x.x.x
                IP.2 = 127.0.0.1
                
                1 Reply Last reply Reply Quote 0
                • S
                  scottalanmiller
                  last edited by

                  And here is the current error:

                  2015/03/07 15:03:34.330398 Connecting to [x.x.x.x]:5000 (x.x.x.x)
                  2015/03/07 15:03:34.370271 Failed to tls handshake with x.x.x.x x509: cannot validate certificate for x.x.x.x because it doesn't contain any IP SANs
                  
                  ? 1 Reply Last reply Reply Quote 0
                  • S
                    scottalanmiller
                    last edited by

                    IP and Port are definitely correct. I can test that with a telnet.

                    1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      And here is the current error:

                      2015/03/07 15:03:34.330398 Connecting to [x.x.x.x]:5000 (x.x.x.x)
                      2015/03/07 15:03:34.370271 Failed to tls handshake with x.x.x.x x509: cannot validate certificate for x.x.x.x because it doesn't contain any IP SANs
                      

                      OpenSSL is not my strong point but, this might help http://serverfault.com/questions/611120/failed-tls-handshake-does-not-contain-any-ip-sans

                      1 Reply Last reply Reply Quote 1
                      • S
                        scottalanmiller
                        last edited by

                        Apparently this is no one's strong suit.... OpenSSL made this change and didn't document it. The conversion on GitHub is the actual development team trying to get this sorted out 😞

                        1 Reply Last reply Reply Quote 0
                        • S
                          scottalanmiller
                          last edited by

                          I'm not sure if this is progress or not, but I've gotten it to switch to this error:

                          2015/03/08 07:40:51.622838 Connecting to [x.x.x.x]:5000 (x.x.x.x)
                          2015/03/08 07:40:51.659486 Failed to tls handshake with x.x.x.x x509: certificate signed by unknown authority
                          
                          1 Reply Last reply Reply Quote 0
                          • S
                            scottalanmiller
                            last edited by

                            Another guide that I've found. Not sure if it is useful yet.

                            https://dan.langille.org/2014/08/13/getting-logstash-forwarder-working/

                            1 Reply Last reply Reply Quote 0
                            • S
                              scottalanmiller
                              last edited by

                              Okay, at some point everything got broken and even what was working before is not working now. This is pretty crazy both that all of the instructions from DigitalOcean are wrong, the documentation from ELK is wrong and on GitHub there is no consensus on a fix. I'm rapidly losing all faith in ELK as they are dependent on components that are not working and even they don't seem to have any idea how to make work.

                              1 Reply Last reply Reply Quote 0
                              • S
                                scottalanmiller
                                last edited by

                                Rebuilding from their new (updated in the last 72 hours) ELK image and starting fresh.

                                1 Reply Last reply Reply Quote 1
                                • S
                                  scottalanmiller
                                  last edited by

                                  Update: DigitalOcean has a new build of the ELK image that is fully up to date since I started this thread and you need it in order for things to work. If you are experiencing the issues that I listed above, stop and start over with the latest build. Things "just work" again. I already have CentOS running on CloudatCost sending logs over to ELK on DigitalOcean.

                                  1 Reply Last reply Reply Quote 0
                                  • S
                                    scottalanmiller
                                    last edited by

                                    If you have a central jump server like we do, it is super easy to push out keys. Once you have the key in place on the Jump server, you can do this to update it at client machines (very easy to script.)

                                    scp /etc/pki/tls/certs/logstash-forwarder.crt root@dny-lnx-pbx1:/etc/pki/tls/certs/
                                    
                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      scottalanmiller
                                      last edited by

                                      Just got a third server feeding into the ELK system. This is working perfectly after the latest update.

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        scottalanmiller
                                        last edited by

                                        Here is my working /etc/logstash-forwarder configuration file (x.x.x.x = my IP address, of course)

                                        {
                                          "network": {
                                            "servers": [ "x.x.x.x:5000" ],
                                            "timeout": 15,
                                            "ssl ca": "/etc/pki/tls/certs/logstash-forwarder.crt"
                                          },
                                          "files": [
                                            {
                                              "paths": [
                                                "/var/log/messages",
                                                "/var/log/secure"
                                               ],
                                              "fields": { "type": "syslog" }
                                            }
                                           ]
                                        }
                                        
                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          scottalanmiller
                                          last edited by

                                          Next step is to see if the ElasticSearch YUM repos work for this, because that will be far better than the one off RPM install that DO has us doing in their docs. So let's see.

                                          Here is the docs from ELK.

                                          http://www.elasticsearch.org/guide/en/elasticsearch/reference/current/setup-repositories.html

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            scottalanmiller
                                            last edited by

                                            Here is what some heavy log ingest looks like on the CPU...

                                            Capture.PNG

                                            1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post