Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
44 commits
Select commit Hold shift + click to select a range
c0a8e17
Fix breaking change in monitoring data (#7563)
ruflin Jul 18, 2018
5eaf0b6
Add http.request.mehod to Kibana log filset (#7607)
ruflin Jul 18, 2018
3a0ab98
Fix rename log message (#7614)
ruflin Jul 18, 2018
02bc2d4
Add tests to verify template content (#7606)
ruflin Jul 18, 2018
731081b
Basic support of ES GC metrics for jvm9 (#7628)
immon Jul 18, 2018
5eaafff
Improve fields.yml generator of modules (#7533)
kvch Jul 18, 2018
c558984
Fix filebeat registry meta being nil vs empty (#7632)
Jul 19, 2018
efb1b2a
Heartbeat Job Validation + addition of libbeat/mapval (#7587)
andrewvc Jul 19, 2018
182bddd
Only fetch shard metrics from master node (#7635)
ycombinator Jul 19, 2018
e5791d2
Create (X-Pack Monitoring) stats metricset for Kibana module (#7525)
ycombinator Jul 19, 2018
a314e34
Add kubernetes specs for auditbeat file integrity monitoring (#7642)
vjsamuel Jul 20, 2018
b8b8c59
Release the rename processor as GA
ruflin Jul 20, 2018
bd1f233
Merge pull request #7656 from ruflin/make-rename-processor-ga
ycombinator Jul 20, 2018
2a8dbe0
Fix log message for Kibana beta state (#7631)
ruflin Jul 20, 2018
e80283b
Clean up experimental and beta messages (#7659)
ruflin Jul 20, 2018
bf6924d
Release raid and socket metricset from system module as GA (#7658)
ruflin Jul 20, 2018
630398d
Update geoip config docs (#7640)
dedemorton Jul 20, 2018
1002bc3
Document breaking change in monitoring shcema
Jul 20, 2018
cc42201
Edit breaking changes statement about monitoring schema changes (#7666)
dedemorton Jul 20, 2018
96eae34
Marking Elasticsearch module and its metricsets as beta (#7662)
ycombinator Jul 23, 2018
f2e50df
Increase kafka version in tests to 1.1.1 (#7655)
Jul 23, 2018
5544838
Add missing mongodb status fields (#7613)
a3dho3yn Jul 23, 2018
b2fb25d
Remove outdated vendor information. (#7676)
simitt Jul 23, 2018
e2ddff7
Fix Filebeat tests with new region_iso_code field (#7678)
ruflin Jul 23, 2018
ff45ef8
Fix duplicated module headers (#7650)
ruflin Jul 23, 2018
9db7866
Release munin and traefik module as beta. (#7660)
ruflin Jul 23, 2018
425828a
Report k8s pct metrics from enrichment process (#7677)
exekias Jul 23, 2018
5d32a72
Fix misspell in Beats repo (#7679)
ruflin Jul 23, 2018
37d4dce
Update sarama (kafka client) to 1.17 (#7665)
Jul 24, 2018
7cd81b1
Update github.com/OneOfOne/xxhash to fix mips
andrewkroh Jul 23, 2018
2b142fa
Update boltdb to use github.com/coreos/bbolt fork
andrewkroh Jul 23, 2018
5406745
Generate fields.yml using Mage (#7670)
andrewkroh Jul 24, 2018
623be88
Update go-ucfg to 0.6.1 (#7599)
Jul 24, 2018
db8dac8
Docs: Add deprecation check for dashboard loading. (#7675)
simitt Jul 24, 2018
bfe4c11
Add envoyproxy module (#7569)
berfinsari Jul 24, 2018
dd5938e
Exclude IOWait time from the CPU total (#7691)
tsg Jul 24, 2018
2bbf5a2
Add support for alias field type to fields.yml (#7645)
ruflin Jul 24, 2018
60ff751
Add jsondiff to test requirements. (#7694)
simitt Jul 24, 2018
9b268ba
Moving Prometheus collector metricset to GA (#7698)
ruflin Jul 24, 2018
8771862
Refactoring: extracting helper function for broader usage (#7693)
ycombinator Jul 24, 2018
7e79bb4
Auditd: Document the backpressure_strategy option (#7157)
adriansr Jul 12, 2018
1d4eb23
Document the `show` command in auditbeat (#7114)
adriansr Jul 12, 2018
6a25c09
Update state_node metricset (#7699)
exekias Jul 24, 2018
a974a6c
Merge branch 'master' into automatic_merge_from_master_to_6.x_branch
tsg Jul 24, 2018
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions CHANGELOG.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,7 @@ https://github.com/elastic/beats/compare/v6.2.3...master[Check the HEAD diff]
- Change http/server metricset to put events by default under http.server and prefix config options with server.. {pull}7100[7100]
- Disable dedotting in docker module configuration. This will change the out-of-the-box behaviour, but not the one of already configured instances. {pull}7485[7485]
- Fix typo in etcd/self metricset fields from *.bandwithrate to *.bandwidthrate. {pull}7456[7456]
- Changed the definition of the `system.cpu.total.pct` and `system.cpu.total.norm.cou` fields to exclude the IOWait time. {pull}7691[7691]

*Packetbeat*

Expand Down Expand Up @@ -131,6 +132,7 @@ https://github.com/elastic/beats/compare/v6.2.3...master[Check the HEAD diff]
- Do not report Metricbeat container host as hostname in Kubernetes deployment. {issue}7199[7199]
- Ensure metadata updates don't replace existing pod metrics. {pull}7573[7573]
- Fix kubernetes pct fields reporting. {pull}7677[7677]
- Add support for new `kube_node_status_condition` in Kubernetes `state_node`. {pull}7699[7699]

*Packetbeat*

Expand Down Expand Up @@ -317,6 +319,8 @@ https://github.com/elastic/beats/compare/v6.2.3...master[Check the HEAD diff]
- Release raid and socket metricset from system module as GA. {pull}7658[7658]
- Release elasticsearch module and all its metricsets as beta. {pull}7662[7662]
- Release munin and traefik module as beta. {pull}7660[7660]
- Add envoyproxy module. {pull}7569[7569]
- Release prometheus collector metricset as GA. {pull}7660[7660]

*Packetbeat*

Expand Down
74 changes: 73 additions & 1 deletion auditbeat/docs/modules/auditd.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,55 @@ from listening to audit messages:
systemctl mask systemd-journald-audit.socket
-----

[float]
=== Inspect the kernel audit system status

{beatname_uc} provides useful commands to query the state of the audit system
in the Linux kernel.

* See the list of installed audit rules:
+
[source,shell]
-----
auditbeat show auditd-rules
-----
+
Prints the list of loaded rules, similar to `auditctl -l`:
+
[source,shell]
-----
-a never,exit -S all -F pid=26253
-a always,exit -F arch=b32 -S all -F key=32bit-abi
-a always,exit -F arch=b64 -S execve,execveat -F key=exec
-a always,exit -F arch=b64 -S connect,accept,bind -F key=external-access
-w /etc/group -p wa -k identity
-w /etc/passwd -p wa -k identity
-w /etc/gshadow -p wa -k identity
-a always,exit -F arch=b64 -S open,truncate,ftruncate,creat,openat,open_by_handle_at -F exit=-EACCES -F key=access
-a always,exit -F arch=b64 -S open,truncate,ftruncate,creat,openat,open_by_handle_at -F exit=-EPERM -F key=access
-----

* See the status of the audit system:
+
[source,shell]
-----
auditbeat show auditd-status
-----
+
Prints the status of the kernel audit system, similar to `auditctl -s`:
+
[source,shell]
-----
enabled 1
failure 0
pid 0
rate_limit 0
backlog_limit 8192
lost 14407
backlog 0
backlog_wait_time 0
features 0xf
-----

[float]
=== Configuration options
Expand All @@ -79,10 +128,11 @@ following example shows all configuration options with their default values.
- module: auditd
resolve_ids: true
failure_mode: silent
backlog_limit: 8196
backlog_limit: 8192
rate_limit: 0
include_raw_message: false
include_warnings: false
backpressure_strategy: auto
----

*`socket_type`*:: This optional setting controls the type of
Expand Down Expand Up @@ -146,6 +196,28 @@ loaded after the rules declared in `audit_rules` are loaded. Wildcards are
supported and will expand in lexicographical order. The format is the same as
that of the `audit_rules` field.

*`backpressure_strategy`*:: Specifies the strategy that {beatname_uc} uses to
prevent backpressure from propagating to the kernel and impacting audited
processes.
+
--
The possible values are:

- `auto` (default): {beatname_uc} uses the `kernel` strategy, if supported, or
falls back to the `userspace` strategy.
- `kernel`: {beatname_uc} sets the `backlog_wait_time` in the kernel's
audit framework to 0. This causes events to be discarded in the kernel if
the audit backlog queue fills to capacity. Requires a 3.14 kernel or
newer.
- `userspace`: {beatname_uc} drops events when there is backpressure
from the publishing pipeline. If no `rate_limit` is set, {beatname_uc} sets a rate
limit of 5000. Users should test their setup and adjust the `rate_limit`
option accordingly.
- `both`: {beatname_uc} uses the `kernel` and `userspace` strategies at the same
time.
- `none`: No backpressure mitigation measures are enabled.
--

[float]
=== Audit rules

Expand Down
74 changes: 73 additions & 1 deletion auditbeat/module/auditd/_meta/docs.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,55 @@ from listening to audit messages:
systemctl mask systemd-journald-audit.socket
-----

[float]
=== Inspect the kernel audit system status

{beatname_uc} provides useful commands to query the state of the audit system
in the Linux kernel.

* See the list of installed audit rules:
+
[source,shell]
-----
auditbeat show auditd-rules
-----
+
Prints the list of loaded rules, similar to `auditctl -l`:
+
[source,shell]
-----
-a never,exit -S all -F pid=26253
-a always,exit -F arch=b32 -S all -F key=32bit-abi
-a always,exit -F arch=b64 -S execve,execveat -F key=exec
-a always,exit -F arch=b64 -S connect,accept,bind -F key=external-access
-w /etc/group -p wa -k identity
-w /etc/passwd -p wa -k identity
-w /etc/gshadow -p wa -k identity
-a always,exit -F arch=b64 -S open,truncate,ftruncate,creat,openat,open_by_handle_at -F exit=-EACCES -F key=access
-a always,exit -F arch=b64 -S open,truncate,ftruncate,creat,openat,open_by_handle_at -F exit=-EPERM -F key=access
-----

* See the status of the audit system:
+
[source,shell]
-----
auditbeat show auditd-status
-----
+
Prints the status of the kernel audit system, similar to `auditctl -s`:
+
[source,shell]
-----
enabled 1
failure 0
pid 0
rate_limit 0
backlog_limit 8192
lost 14407
backlog 0
backlog_wait_time 0
features 0xf
-----

[float]
=== Configuration options
Expand All @@ -74,10 +123,11 @@ following example shows all configuration options with their default values.
- module: auditd
resolve_ids: true
failure_mode: silent
backlog_limit: 8196
backlog_limit: 8192
rate_limit: 0
include_raw_message: false
include_warnings: false
backpressure_strategy: auto
----

*`socket_type`*:: This optional setting controls the type of
Expand Down Expand Up @@ -141,6 +191,28 @@ loaded after the rules declared in `audit_rules` are loaded. Wildcards are
supported and will expand in lexicographical order. The format is the same as
that of the `audit_rules` field.

*`backpressure_strategy`*:: Specifies the strategy that {beatname_uc} uses to
prevent backpressure from propagating to the kernel and impacting audited
processes.
+
--
The possible values are:

- `auto` (default): {beatname_uc} uses the `kernel` strategy, if supported, or
falls back to the `userspace` strategy.
- `kernel`: {beatname_uc} sets the `backlog_wait_time` in the kernel's
audit framework to 0. This causes events to be discarded in the kernel if
the audit backlog queue fills to capacity. Requires a 3.14 kernel or
newer.
- `userspace`: {beatname_uc} drops events when there is backpressure
from the publishing pipeline. If no `rate_limit` is set, {beatname_uc} sets a rate
limit of 5000. Users should test their setup and adjust the `rate_limit`
option accordingly.
- `both`: {beatname_uc} uses the `kernel` and `userspace` strategies at the same
time.
- `none`: No backpressure mitigation measures are enabled.
--

[float]
=== Audit rules

Expand Down
36 changes: 18 additions & 18 deletions filebeat/module/icinga/startup/test/test.log-expected.json
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
[
{
"@timestamp": "2018-07-24T10:26:47.908Z",
"fileset.module": "icinga",
"fileset.name": "startup",
"icinga.startup.facility": "cli",
"icinga.startup.message": "Icinga application loader (version: r2.6.3-1)",
"icinga.startup.severity": "information",
"input.type": "log",
"offset": 0,
"@timestamp": "2018-07-23T11:50:38.896Z",
"fileset.module": "icinga",
"fileset.name": "startup",
"icinga.startup.facility": "cli",
"icinga.startup.message": "Icinga application loader (version: r2.6.3-1)",
"icinga.startup.severity": "information",
"input.type": "log",
"offset": 0,
"prospector.type": "log"
},
},
{
"@timestamp": "2018-07-24T10:26:47.908Z",
"fileset.module": "icinga",
"fileset.name": "startup",
"icinga.startup.facility": "cli",
"icinga.startup.message": "Loading configuration file(s).",
"icinga.startup.severity": "information",
"input.type": "log",
"offset": 63,
"@timestamp": "2018-07-23T11:50:38.896Z",
"fileset.module": "icinga",
"fileset.name": "startup",
"icinga.startup.facility": "cli",
"icinga.startup.message": "Loading configuration file(s).",
"icinga.startup.severity": "information",
"input.type": "log",
"offset": 63,
"prospector.type": "log"
}
]
]
2 changes: 2 additions & 0 deletions filebeat/module/iis/access/test/test.log-expected.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
"iis.access.geoip.country_iso_code": "DE",
"iis.access.geoip.location.lat": 52.5167,
"iis.access.geoip.location.lon": 13.4,
"iis.access.geoip.region_iso_code": "DE-BE",
"iis.access.geoip.region_name": "Land Berlin",
"iis.access.method": "GET",
"iis.access.port": "80",
Expand Down Expand Up @@ -73,6 +74,7 @@
"iis.access.geoip.country_iso_code": "DE",
"iis.access.geoip.location.lat": 52.5167,
"iis.access.geoip.location.lon": 13.4,
"iis.access.geoip.region_iso_code": "DE-BE",
"iis.access.geoip.region_name": "Land Berlin",
"iis.access.hostname": "example.com",
"iis.access.http_version": "1.1",
Expand Down
3 changes: 3 additions & 0 deletions filebeat/module/iis/error/test/test.log-expected.json
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@
"iis.error.geoip.country_iso_code": "DE",
"iis.error.geoip.location.lat": 52.5167,
"iis.error.geoip.location.lon": 13.4,
"iis.error.geoip.region_iso_code": "DE-BE",
"iis.error.geoip.region_name": "Land Berlin",
"iis.error.http_version": "1.1",
"iis.error.method": "GET",
Expand All @@ -50,6 +51,7 @@
"iis.error.geoip.country_iso_code": "DE",
"iis.error.geoip.location.lat": 52.5167,
"iis.error.geoip.location.lon": 13.4,
"iis.error.geoip.region_iso_code": "DE-BE",
"iis.error.geoip.region_name": "Land Berlin",
"iis.error.http_version": "2.0",
"iis.error.method": "GET",
Expand All @@ -74,6 +76,7 @@
"iis.error.geoip.country_iso_code": "DE",
"iis.error.geoip.location.lat": 52.5167,
"iis.error.geoip.location.lon": 13.4,
"iis.error.geoip.region_iso_code": "DE-BE",
"iis.error.geoip.region_name": "Land Berlin",
"iis.error.queue_name": "-",
"iis.error.reason_phrase": "Timer_MinBytesPerSecond",
Expand Down
3 changes: 3 additions & 0 deletions filebeat/module/nginx/access/test/test.log-expected.json
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,7 @@
"nginx.access.geoip.country_iso_code": "DE",
"nginx.access.geoip.location.lat": 52.5167,
"nginx.access.geoip.location.lon": 13.4,
"nginx.access.geoip.region_iso_code": "DE-BE",
"nginx.access.geoip.region_name": "Land Berlin",
"nginx.access.http_version": "1.1",
"nginx.access.method": "GET",
Expand Down Expand Up @@ -100,6 +101,7 @@
"nginx.access.geoip.country_iso_code": "DE",
"nginx.access.geoip.location.lat": 52.5167,
"nginx.access.geoip.location.lon": 13.4,
"nginx.access.geoip.region_iso_code": "DE-BE",
"nginx.access.geoip.region_name": "Land Berlin",
"nginx.access.http_version": "1.1",
"nginx.access.method": "GET",
Expand Down Expand Up @@ -133,6 +135,7 @@
"nginx.access.geoip.country_iso_code": "US",
"nginx.access.geoip.location.lat": 39.772,
"nginx.access.geoip.location.lon": -89.6859,
"nginx.access.geoip.region_iso_code": "US-IL",
"nginx.access.geoip.region_name": "Illinois",
"nginx.access.http_version": "1.1",
"nginx.access.method": "GET",
Expand Down
1 change: 1 addition & 0 deletions filebeat/module/system/auth/test/test.log-expected.json
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,7 @@
"system.auth.ssh.geoip.country_iso_code": "CN",
"system.auth.ssh.geoip.location.lat": 22.5333,
"system.auth.ssh.geoip.location.lon": 114.1333,
"system.auth.ssh.geoip.region_iso_code": "CN-44",
"system.auth.ssh.geoip.region_name": "Guangdong",
"system.auth.ssh.ip": "116.31.116.24",
"system.auth.ssh.method": "password",
Expand Down
1 change: 1 addition & 0 deletions filebeat/module/traefik/access/test/test.log-expected.json
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@
"traefik.access.geoip.country_iso_code": "DE",
"traefik.access.geoip.location.lat": 52.5167,
"traefik.access.geoip.location.lon": 13.4,
"traefik.access.geoip.region_iso_code": "DE-BE",
"traefik.access.geoip.region_name": "Land Berlin",
"traefik.access.http_version": "1.1",
"traefik.access.method": "GET",
Expand Down
1 change: 1 addition & 0 deletions libbeat/common/field.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ type Field struct {
DocValues *bool `config:"doc_values"`
CopyTo string `config:"copy_to"`
IgnoreAbove int `config:"ignore_above"`
AliasPath string `config:"path"`

// Kibana specific
Analyzed *bool `config:"analyzed"`
Expand Down
4 changes: 3 additions & 1 deletion libbeat/metric/system/cpu/cpu.go
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,9 @@ func cpuPercentages(s0, s1 *sigar.Cpu, numCPU int) Percentages {
}

calculateTotalPct := func() float64 {
return common.Round(float64(numCPU)-calculatePct(s0.Idle, s1.Idle), common.DefaultDecimalPlacesCount)
// IOWait time is excluded from the total as per #7627.
idle := calculatePct(s0.Idle, s1.Idle) + calculatePct(s0.Wait, s1.Wait)
return common.Round(float64(numCPU)-idle, common.DefaultDecimalPlacesCount)
}

return Percentages{
Expand Down
9 changes: 9 additions & 0 deletions libbeat/template/processor.go
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,8 @@ func (p *Processor) Process(fields common.Fields, path string, output common.Map
mapping = p.object(&field)
case "array":
mapping = p.array(&field)
case "alias":
mapping = p.alias(&field)
case "group":
var newPath string
if path == "" {
Expand Down Expand Up @@ -242,6 +244,13 @@ func (p *Processor) array(f *common.Field) common.MapStr {
return properties
}

func (p *Processor) alias(f *common.Field) common.MapStr {
properties := getDefaultProperties(f)
properties["type"] = "alias"
properties["path"] = f.AliasPath
return properties
}

func (p *Processor) object(f *common.Field) common.MapStr {
dynProperties := getDefaultProperties(f)

Expand Down
4 changes: 4 additions & 0 deletions libbeat/template/processor_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,10 @@ func TestProcessor(t *testing.T) {
output: p.array(&common.Field{Type: "array", Index: &falseVar, ObjectType: "keyword"}),
expected: common.MapStr{"index": false, "type": "keyword"},
},
{
output: p.alias(&common.Field{Type: "alias", AliasPath: "a.b"}),
expected: common.MapStr{"path": "a.b", "type": "alias"},
},
{
output: p.object(&common.Field{Type: "object", Enabled: &falseVar}),
expected: common.MapStr{
Expand Down
Loading