Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sivasamyk/logtrail
Kibana plugin to view, search & live tail log events
https://github.com/sivasamyk/logtrail
elasticsearch event-viewer kibana log-viewer logging logstash papertrail syslog
Last synced: 24 days ago
JSON representation
Kibana plugin to view, search & live tail log events
- Host: GitHub
- URL: https://github.com/sivasamyk/logtrail
- Owner: sivasamyk
- License: mit
- Created: 2016-01-11T20:02:19.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2023-12-30T06:37:46.000Z (10 months ago)
- Last Synced: 2024-10-05T05:03:42.292Z (about 1 month ago)
- Topics: elasticsearch, event-viewer, kibana, log-viewer, logging, logstash, papertrail, syslog
- Language: JavaScript
- Homepage:
- Size: 3.89 MB
- Stars: 1,398
- Watchers: 35
- Forks: 186
- Open Issues: 87
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
- awesome-elasticsearch - LogTrail - a plugin for Kibana to view, analyze, search and tail log events from multiple hosts in realtime with devops friendly interface inspired by Papertrail (Kibana plugins and applications / Kibana Visualization plugins)
- elasticsearch-collection - LogTrail - a plugin for Kibana to view, analyze, search and tail log events from multiple hosts in realtime with devops friendly interface inspired by Papertrail (Kibana plugins and applications / Kibana Visualization plugins)
README
# LogTrail - Log Viewer plugin for Kibana (DEPRECATED)
[![Github All Releases](https://img.shields.io/github/downloads/sivasamyk/logtrail/total.svg)](https://github.com/sivasamyk/logtrail/releases) [![Kibana 7.9.2](https://img.shields.io/badge/Kibana-v7.9.2-blue.svg)](https://www.elastic.co/guide/en/kibana/7.5/release-notes-7.9.2.html)
[![License](https://img.shields.io/github/license/sivasamyk/logtrail.svg)](https://github.com/sivasamyk/logtrail) ![maintenance-status](https://img.shields.io/badge/maintenance-deprecated-red.svg)**This plugin is no longer maintained. Please use the built-in [tail logs](https://www.elastic.co/guide/en/observability/current/tail-logs.html) feature in Kibana.**
LogTrail is a plugin for Kibana to view, analyze, search, and tail log events from multiple hosts in realtime with DevOps friendly interface inspired by [Papertrail](https://papertrailapp.com/).
![Events](screenshot.png)
Features
--------
- View, analyze, and search log events from a centralized interface
- Clean & simple DevOps friendly interface
- Live tail
- Filter aggregated logs by hosts and program
- Quickly seek to logs based on time
- Supports highlighting of search matches
- Supports multiple Elasticsearch index patterns each with different schemas
- Can be extended by adding additional fields to log event
- Color coding of messages based on field values
- Powerful search using [Lucene query syntax](https://www.elastic.co/guide/en/kibana/current/lucene-query.html)Installation
------------
- Prerequisites
- Download and install Elasticsearch and Kibana
- Logtrail is supported and tested with Kibana 6.x and 5.x
- Install logtrail plugin (requires a restart of Kibana after install)
- Kibana 7.9.2 : `./bin/kibana-plugin install https://github.com/sivasamyk/logtrail/releases/download/v0.1.31/logtrail-7.9.2-0.1.31.zip`
- Kibana 5.6.5 : `./bin/kibana-plugin install https://github.com/sivasamyk/logtrail/releases/download/v0.1.23/logtrail-5.7.9.2.1.23.zip`
- Other versions : [https://github.com/sivasamyk/logtrail/releases](https://github.com/sivasamyk/logtrail/releases)
- Kibana requires an exact match of the plugin version to the Kibana version. If you can't find the logtrail plugin release for a Kibana release, follow the instructions [here](docs/how_to.md#2-update-kibanaversion-in-logtrail-plugin-archive) to update the Kibana version in your logtrail plugin archive.
- Refer [Logtrail Config Examples Repo](https://github.com/sivasamyk/logtrail-config-examples) for sample configurations for syslog, Java app, Kubernetes logs.Configuration
-------------
- Logtrail can be configured by editing the following fields present in `logtrail.json` file located inside`./plugins/logtrail` directory.
- `default_index` - Elasticsearch index where the syslog events are stored (default: logstash-*)
- `default_time_range_in_days` - Default time range in days to search when time is not specified using Seek button.
Example: A value of 30 means logtrail will search only in logs from the last 30 days unless time is specified using the Seek button.
A value of 0 means logtrail will search in all available logs by default.
- `display_timezone` - Timezone to display the timestamp in Event Viewer. e.g. `America/Los_Angeles`. The default value of `local` will use the timezone of the browser. The time specified in `Seek To` popup will always use browser timezone.
- `display_timestamp_format` - Format to display the timestamp in Event Viewer. For list of valid value refer [here](http://momentjs.com/docs/#/displaying/)
- `default_search` - if specified, this will be applied as default search text while launching logtrail. The value can be any search text. e.g. `ssh` - shows all logs with `ssh` in the message field. or `log_level:SEVERE` - shows all logs where `log_level` field is `SEVERE`. The field name should be a valid field in the Elasticsearch document. The default search field is the field mapped to `message`.
- `fields` - Edit this parameter to map the event fields in ES to logtrail fields
- `timestamp` - maps to @timestamp field inserted by logstash. This will be used for querying internally. Logtrail recommends @timestamp to be stored in UTC in ES.
- `hostname` - hostname from where the events were received. Also used by hostname filter. The hostname field should be of type `keyword`. For more info check out [Hostname field need to be of type keyword](docs/how_to.md#1-hostname-field-need-to-be-of-type-keyword)
- `program` - program that generated this event.
- `message` - actual event message. This field will be used by search.
- Example: If the event fields names are @timestamp, host, process, message the mapping should be
```json
"mapping" : {
"timestamp" : "@timestamp",
"hostname" : "host",
"program": "process",
"message": "message"
}
```
- By default each line displayed in the events view is of format:
`display_timestamp hostname program:message`
- `message_format` - Used to add additional fields to be shown for log event. For more details refer [Adding additional fields](docs/add_fields.md)
- `keyword_suffix` - Specifies the keyword suffix to be appended for hostname & program fields. Set it to empty string (`""`) to not append any suffix. If not specified (`undefined`) logtrail will append `keyword`.
- `color_mapping` - Color code messages based on field values. For more details refer [Color coding messages](docs/color_mapping.md)
- Any changes in `logtrail.json` require a restart of Kibana
- Logtrail can read `logtrail.json` configuration from Elasticsearch instead of the filesystem. This will be useful when sharing the same configuration across multiple installations. For more info refer [Load Logtrail configuration from Elasticsearch](https://github.com/sivasamyk/logtrail/blob/master/docs/how_to.md#3-load-logtrail-configuration-from-elasticsearch)
- Refer [logtrail-config-examples](https://github.com/sivasamyk/logtrail-config-examples) repo for sample configurations
- Logs & Events from Windows, Java, Python, PHP, Perl, Ruby, Android, Docker, .Net can be shipped using the syslog protocol.
- For more configuration options refer to [Papertrail Configuration Help](http://help.papertrailapp.com/).
- Beats/Fluentd can also be used to ship events to ES and fields can be mapped using the `fields` parameter in `logtrail.json`