WARNING: Version 5.3 of Beats has passed its EOL date.
This documentation is no longer being maintained and may be removed. If you are running this version, we strongly advise you to upgrade. For the latest information, see the current release documentation.
The simplest architecture for the Beats platform setup consists of one or more Beats, Elasticsearch, and Kibana. This architecture is easy to get started with and sufficient for networks with low traffic. It also uses the minimum amount of servers: a single machine running Elasticsearch and Kibana. The Beats insert the transactions directly into the Elasticsearch instance.
If you want to perform additional processing or buffering on the data, however, you’ll want to install Logstash.
An important advantage to this approach is that you can use Logstash to modify the data captured by Beats in any way you like. You can also use Logstash’s many output plugins to integrate with other systems.
To download and install Logstash, use the commands that work with your system:
sudo apt-get install openjdk-8-jre curl -L -O https://artifacts.elastic.co/downloads/logstash/logstash-5.3.3.deb sudo dpkg -i logstash-5.3.3.deb
sudo yum install java-1.8.0-openjdk curl -L -O https://artifacts.elastic.co/downloads/logstash/logstash-5.3.3.rpm sudo rpm -i logstash-5.3.3.rpm
# install Java, e.g. from: https://www.java.com/en/download/manual.jsp curl -L -O https://artifacts.elastic.co/downloads/logstash/logstash-5.3.3.zip unzip logstash-5.3.3.zip
Don’t start Logstash yet. You need to set a couple of configuration options first.
In this setup, the Beat sends events to Logstash. Logstash receives these events by using the Beats input plugin for Logstash and then sends the transaction to Elasticsearch by using the Elasticsearch output plugin for Logstash. The Elasticsearch output plugin uses the bulk API, making indexing very efficient.
To set up Logstash, you create a Logstash pipeline configuration file that
configures Logstash to listen on port 5044 for incoming Beats connections
and to index into Elasticsearch. For example, you can save the following
example configuration to a file called
When you run Logstash with this configuration, it indexes events into Elasticsearch in the same way that the Beat would, but you get access to other capabilities provided by Logstash for collecting, enriching, and transforming data. See the Logstash introduction for more information about these capabilities.
To use this setup, you’ll also need to configure your Beat to use Logstash. For more information, see the documentation for the Beat.
Plugins have their own release cycle and are often released independent of Logstash’s core release cycle. To ensure that you have the latest version of the Beats input plugin for Logstash, run the following command from your Logstash installation:
deb, rpm, and mac:
./bin/logstash-plugin update logstash-input-beats
bin\logstash-plugin update logstash-input-beats
Keep in mind that you can update to the latest version of the plugin without having to upgrade to a newer version of Logstash. More details about working with input plugins in Logstash are available here.
Now you can start Logstash. Use the command that works with your system. If you installed Logstash as a deb or rpm package, make sure the config file is in the expected directory.
sudo /etc/init.d/logstash start
sudo service logstash start
./bin/logstash -f logstash.conf
bin\logstash.bat -f logstash.conf
The default configuration for Beats and Logstash uses plain TCP. For encryption you must explicitly enable SSL when you configure Beats and Logstash.
You can learn more about installing, configuring, and running Logstash here.