How to get started with log analysis
Click the link above if you are not automatically redirected in 10 seconds.
This article introduces exploring logs with Kibana. Elastic Stack containers are included in GroundWork Monitor. Kibana lets users visualize data with charts and graphs in Elasticsearch.
GroundWork Monitor Enterprise has long supported integration with Elastic Stack, also known as Elasticsearch, Logstash, and Kibana. We have now bundled in a containerized instance of Elastic Stack into GroundWork Monitor 8, and have forwarded all of the container logging to it by default.
This initial implementation is not the same as the Log Bridge integration we support in GroundWork Monitor 7.x. There is no integration of saved searches as services in GroundWork Monitor as yet, but we are preparing to implement this in upcoming versions.
While the utility of the Elastic integration we include here is minimal, it is definitely possible to forward log messages from external systems to the elastic instance in GroundWork Monitor 8, and to use additional features of Elastic. We will support the correct functioning of the bundled container and Elastic Stack, however we do not recommend any large-scale Elastic implementations using this container - it is too small to support more than the log analysis of local logs. We recommend implementing a cluster of systems running Elastic Stack in accordance with the documentation Elastic provides if this is what you wish to do. We can refer you to implementation partners for this purpose.
We plan on implementing additional integrations with Elastic in future versions.
Getting started with Kibana
- In GroundWork Monitor, navigate to Dashboards > Log Analysis to launch Kibana.
- As a first run, define the index pattern, this is what Elasticsearch will index and analyze.
- On the left sidebar menu (expand or collapse), click the Management menu option.
- Click Index Patterns.
- Click Create index pattern, and Kibana will automatically identify the new logstash-* index pattern.
- Define it as logstash-*, and click Next step.
- Select @timestamp as the Time Filter field name.
- Click Create index pattern.
Performing a discovery
- Navigate to the left sidebar menu and click Discover to see the data table of log entries.
- In the top right hand corner, click on the far fa-calendar-alt icon next to Last 15 minutes, then select Today.
- You can see the Available fields list on the left side.
- On mouse over for each of the fields, the Add button is exposed.
- Located and add the fields container.name. and message.
- As shown in the next image, you should see the two new fields under the Selected fields title.
- You will also see the fields (container.name and message) as columns in the table.
- Under the Selected fields list click on the container.name item, where you should see the Top 5 values.
- To create a filter by docker container, click on the magnifier icon for any container. You will see log entries only for the one container.
- Filters are added to the top of the table. Hovering over a filter displays filter actions, or you can select the Actions button from the right side of the screen.
To learn more, take a look at A Kibana Tutorial.
How to navigate hit list dashboard (Knowledge Base)
How to navigate events dashboard (Knowledge Base)
How to navigate home dashboard (Knowledge Base)
How to navigate insight dashboard (Knowledge Base)
How to navigate VMware dashboard (Knowledge Base)
How to navigate status summary (Knowledge Base)
How to create NOC boards (Knowledge Base)