Kibana plugin to view, search & live tail log events
This plugin is no longer maintained. Please use the built-in tail logs feature in Kibana.
LogTrail is a plugin for Kibana to view, analyze, search, and tail log events from multiple hosts in realtime with DevOps friendly interface inspired by Papertrail.
./bin/kibana-plugin install https://github.com/sivasamyk/logtrail/releases/download/v0.1.31/logtrail-7.9.2-0.1.31.zip
./bin/kibana-plugin install https://github.com/sivasamyk/logtrail/releases/download/v0.1.23/logtrail-5.7.9.2.1.23.zip
logtrail.json
file located inside./plugins/logtrail
directory.default_index
- Elasticsearch index where the syslog events are stored (default: logstash-*)default_time_range_in_days
- Default time range in days to search when time is not specified using Seek button.display_timezone
- Timezone to display the timestamp in Event Viewer. e.g. America/Los_Angeles
. The default value of local
will use the timezone of the browser. The time specified in Seek To
popup will always use browser timezone.display_timestamp_format
- Format to display the timestamp in Event Viewer. For list of valid value refer heredefault_search
- if specified, this will be applied as default search text while launching logtrail. The value can be any search text. e.g. ssh
- shows all logs with ssh
in the message field. or log_level:SEVERE
- shows all logs where log_level
field is SEVERE
. The field name should be a valid field in the Elasticsearch document. The default search field is the field mapped to message
.fields
- Edit this parameter to map the event fields in ES to logtrail fields
timestamp
- maps to @timestamp field inserted by logstash. This will be used for querying internally. Logtrail recommends @timestamp to be stored in UTC in ES.hostname
- hostname from where the events were received. Also used by hostname filter. The hostname field should be of type keyword
. For more info check out Hostname field need to be of type keywordprogram
- program that generated this event.message
- actual event message. This field will be used by search."mapping" : {
"timestamp" : "@timestamp",
"hostname" : "host",
"program": "process",
"message": "message"
}
display_timestamp hostname program:message
message_format
- Used to add additional fields to be shown for log event. For more details refer Adding additional fieldskeyword_suffix
- Specifies the keyword suffix to be appended for hostname & program fields. Set it to empty string (""
) to not append any suffix. If not specified (undefined
) logtrail will append keyword
.color_mapping
- Color code messages based on field values. For more details refer Color coding messageslogtrail.json
require a restart of Kibanalogtrail.json
configuration from Elasticsearch instead of the filesystem. This will be useful when sharing the same configuration across multiple installations. For more info refer Load Logtrail configuration from Elasticsearchfields
parameter in logtrail.json