You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The system.socket metricset reports an event for each new TCP socket that it
sees. It does this by polling the kernel to get a dump of all sockets.
So using a short polling interval with this metricset is important to
not miss short lived connections.
The metricset reports the process that has the socket open. It does this
by associating the socket's inode to the process that has a file
descriptor open pointing to the socket's inode. It reads /proc and
/proc/<pid>/fd just prior to polling the kernel to get all sockets.
A reverse lookup can be performed by the metricset on the remote IP and the
returned hostname will be added to the event and cached. The is disabled by
default and can be enabled through the configuration. If a hostname is found
then the eTLD+1 (effective top-level domain plus one level) value will also be
added to the event.
For the IP address fields the index template for Elasticsearch 5.x uses
the ip field type. But for Elasticsearch 2.x it uses string because the
ip field type in 2.x does not support IPv6 addresses.
Copy file name to clipboardExpand all lines: metricbeat/docs/fields.asciidoc
+142
Original file line number
Diff line number
Diff line change
@@ -6206,6 +6206,148 @@ type: long
6206
6206
Total number of I/O operations performed on all devices by processes in the cgroup as seen by the throttling policy.
6207
6207
6208
6208
6209
+
[float]
6210
+
== socket Fields
6211
+
6212
+
TCP sockets that are active.
6213
+
6214
+
6215
+
6216
+
[float]
6217
+
=== system.socket.direction
6218
+
6219
+
type: keyword
6220
+
6221
+
example: incoming
6222
+
6223
+
How the socket was initiated. Possible values are incoming, outgoing, or listening.
6224
+
6225
+
6226
+
[float]
6227
+
=== system.socket.family
6228
+
6229
+
type: keyword
6230
+
6231
+
example: ipv4
6232
+
6233
+
Address family.
6234
+
6235
+
6236
+
[float]
6237
+
=== system.socket.local.ip
6238
+
6239
+
type: ip
6240
+
6241
+
example: 192.0.2.1 or 2001:0DB8:ABED:8536::1
6242
+
6243
+
Local IP address. This can be an IPv4 or IPv6 address.
6244
+
6245
+
6246
+
[float]
6247
+
=== system.socket.local.port
6248
+
6249
+
type: long
6250
+
6251
+
example: 22
6252
+
6253
+
Local port.
6254
+
6255
+
6256
+
[float]
6257
+
=== system.socket.remote.ip
6258
+
6259
+
type: ip
6260
+
6261
+
example: 192.0.2.1 or 2001:0DB8:ABED:8536::1
6262
+
6263
+
Remote IP address. This can be an IPv4 or IPv6 address
6264
+
6265
+
6266
+
[float]
6267
+
=== system.socket.remote.port
6268
+
6269
+
type: long
6270
+
6271
+
example: 22
6272
+
6273
+
Remote port.
6274
+
6275
+
6276
+
[float]
6277
+
=== system.socket.remote.host
6278
+
6279
+
type: keyword
6280
+
6281
+
example: 76-211-117-36.nw.example.com.
6282
+
6283
+
PTR record associated with the remote IP. It is obtained via reverse IP lookup.
6284
+
6285
+
6286
+
[float]
6287
+
=== system.socket.remote.etld_plus_one
6288
+
6289
+
type: keyword
6290
+
6291
+
example: example.com.
6292
+
6293
+
The effective top-level domain (eTLD) of the remote host plus one more label. For example, the eTLD+1 for "foo.bar.golang.org." is "golang.org.". The data for determining the eTLD comes from an embedded copy of the data from http://publicsuffix.org.
6294
+
6295
+
6296
+
[float]
6297
+
=== system.socket.remote.host_error
6298
+
6299
+
type: keyword
6300
+
6301
+
Error describing the cause of the reverse lookup failure.
6302
+
6303
+
6304
+
[float]
6305
+
=== system.socket.process.pid
6306
+
6307
+
type: long
6308
+
6309
+
ID of the process that opened the socket.
6310
+
6311
+
6312
+
[float]
6313
+
=== system.socket.process.command
6314
+
6315
+
type: keyword
6316
+
6317
+
Name of the command (limited to 20 chars by the OS).
0 commit comments