
rsyslog 是一个 syslogd 的多线程增强版。 现在Fedora和Ubuntu, rhel6默认的日志系统都是rsyslog了 rsyslog负责写入日志, logrotate负责备份和删除旧日志, 以及更新日志文件
版本:
Rsyslog V5 Logstash 5.2.2
配置文件
就不做过多的介绍了直接贴测试通过的rsyslog.conf配置文件该配置文件的目录为:/etc/rsyslog.conf
# rsyslog v5 configuration file# For more information see /usr/share/doc/rsyslog-*/rsyslog_conf.html# If you experience problems, see http://www.rsyslog.com/doc/troubleshoot.html#### MODULES ####$ModLoad imuxsock # provides support for local system logging (e.g. via logger command)$ModLoad imklog # provides kernel logging support (previously done by rklogd)#$ModLoad immark # provides --MARK-- message capability# Provides UDP syslog reception#$ModLoad imudp#$UDPServerRun 514# Provides TCP syslog reception#$ModLoad imtcp#$InputTCPServerRun 514#### GLOBAL DIRECTIVES ##### Use default timestamp format$ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat
# File syncing capability is disabled by default. This feature is usually not required,# not useful and an extreme performance hit#$ActionFileEnableSync on# Include all config files in /etc/rsyslog.d/$IncludeConfig /etc/rsyslog.d/*.conf
#### RULES ##### Log all kernel messages to the console.# Logging much else clutters up the screen.(内核)
kern.* /dev/console
# Log anything (except mail) of level info or higher.# Don't log private authentication messages!(记录的内核消息、各种服务的公共消息,报错信息等)
*.info;mail.none;authpriv.none;cron.none /var/log/messages
# The authpriv file has restricted access.(包含验证和授权方面信息)
authpriv.* /var/log/secure
# Log all the mail messages in one place.(包含来着系统运行电子邮件服务器的日志信息)
mail.* -/var/log/maillog
# Log cron stuff(每当cron进程开始一个工作时,就会将相关信息记录在这个文件中)
cron.* /var/log/cron
# Everybody gets emergency messages
*.emerg *
# Save news errors of level crit and higher in a special file.
uucp,news.crit /var/log/spooler
# Save boot messages also to boot.log(自定义的消息)
local7.* /var/log/boot.log
$ModLoad imfile #装载imfile模块$InputFileName /opt/tomcat/apache-tomcat-8.5.15/logs/catalina.out #读取日志文件$InputFileTag catalina: #日志写入日志附加标签字符串$InputFileFacility local5 #日志类型$InputFileSeverity info #日志等级$InputFileStateFile ssologs.log_state #定义记录偏移量数据文件名$InputFilePollInterval 1 #检查日志文件间隔(秒)$InputFilePersistStateInterval 1 #回写偏移量数据到文件间隔时间(秒)$InputRunFileMonitor #激活读取,可以设置多组日志读取,每组结束时设置本参数。以示生效。$InputFileName /opt/tomcat/apache-tomcat-8.5.15/logs/localhost_access_log.%$year%-%$month%-%$day%.txt #读取日志文件$InputFileTag access: #日志写入日志附加标签字符串$InputFileFacility local6 #日志类型$InputFileSeverity info #日志等级$InputFileStateFile sssologs.log_state #定义记录偏移量数据文件名$InputFilePollInterval 1 #检查日志文件间隔(秒)$InputFilePersistStateInterval 1 #回写偏移量数据到文件间隔时间(秒)$InputRunFileMonitor #激活读取,可以设置多组日志读取,每组结束时设置本参数。以示生效。# ### begin forwarding rule #### The statement between the begin ... end define a SINGLE forwarding# rule. They belong together, do NOT split them. If you create multiple# forwarding rules, duplicate the whole block!# Remote Logging (we use TCP for reliable delivery)## An on-disk queue is created for this action. If the remote host is# down, messages are spooled to disk and sent when it is up again.#$WorkDirectory /var/lib/rsyslog # where to place spool files#$ActionQueueFileName fwdRule1 # unique name prefix for spool files#$ActionQueueMaxDiskSpace 1g # 1gb space limit (use as much as possible)#$ActionQueueSaveOnShutdown on # save messages to disk on shutdown#$ActionQueueType LinkedList # run asynchronously#$ActionResumeRetryCount -1 # infinite retries if host is down# remote host is: name/ip:port, e.g. 192.168.0.1:514, port optional
*.* @10.255.0.167:514
# ### end of the forwarding rule #### A template to for higher precision timestamps + severity logging$template SpiceTmpl,"%TIMESTAMP%.%TIMESTAMP:::date-subseconds% %syslogtag% %syslogseverity-text%:%msg:::sp-if-no-1st-sp%%msg:::drop-last-lf%\n"
:programname, startswith, "spice-vdagent" /var/log/spice-vdagent.log;SpiceTmpl
上面文件中:
#*.* @remote-host:514 *.*即表示转发所有设备的日志信息 @表示使用UDP协议传输 @@表示使用TCP协议传输 找到上面这句去掉前面的#号然后添加对应的IP和端口即可。 例: . @10.255.0.165:514
如果你只想要转发服务器上的指定设备的日志消息,比如说内核设备,那么你可以在rsyslog配置文件中使用以下声明。 kern.* @10.255.0.165:514
修改完成后执行service rsyslog restart 重新启动rsyslong 即可。
Logstash配置
input {
udp {
port => 514
type => syslog
}
}
filter {
if [type] == "syslog" {
grok {
patterns_dir => "/opt/logstash/logstash-5.2.2/patterns"
match => { "message" => "%{SYSLOGTIMESTAMP:timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
}
}
}
output{
elasticsearch {
hosts => ["10.255.0.167"]
index => "rsyslog_test"
}
stdout{
codec => rubydebug
}
}
最后更新配置:/etc/init.d/rsyslog restart 附:Logstash的配置很简单只是监听514端口就可以了,但是使用grok切日志才是麻烦的,毕竟那么多种的日志每种都要写对应的正则。
文章来源网络,作者:运维,如若转载,请注明出处:https://shuyeidc.com/wp/220394.html<