Configure Winlogbeat
Before you begin, you’ll need: Winlogbeat 7 or Winlogbeat 6
Download the Layerlog public certificate
Download the
Layerlog public certificate
to C:\ProgramData\Winlogbeat\COMODORSADomainValidationSecureServerCA.crt
on your machine.
Configure Windows input
If you’re working with the default configuration file,
(C:\Program Files\Winlogbeat\winlogbeat.yml)
clear the contents and start with a fresh file.
Paste this code block.
Replace <<LOG-SHIPPING-TOKEN>> with the token of the account you want to ship to.
winlogbeat.event_logs:
- name: Application
ignore_older: 72h
- name: Security
- name: System
fields:
logzio_codec: json
token: <<LOG-SHIPPING-TOKEN>>
type: wineventlog
fields_under_root: true
If you’re running Winlogbeat 7, paste this code block. Otherwise, you can leave it out.
# ... For Winlogbeat 7 only ...
processors:
- rename:
fields:
- from: "agent"
to: "beat_agent"
ignore_missing: true
- rename:
fields:
- from: "log.file.path"
to: "source"
ignore_missing: true
- rename:
fields:
- from: "log"
to: "log_information"
ignore_missing: true
Set Layerlog as the output
If Layerlog isn’t the output, set it now.
Winlogbeat can have one output only, so remove any other output entries.
Replace <<LISTENER-HOST>> with the host for your region. For example, listener.layerlog.com if your account is hosted on AWS US East, or listener-nl.layerlog.com if hosted on Azure West Europe.
output.logstash:
hosts: ["<<LISTENER-HOST>>:5015"]
ssl:
certificate_authorities: ['C:\ProgramData\Winlogbeat\COMODORSADomainValidationSecureServerCA.crt']
Restart Winlogbeat
Open PowerShell as an admin and run this command:
Restart-Service winlogbeat
Check Layerlog for your logs
Give your logs some time to get from your system to ours, and then open Kibana.
If you still don’t see your logs, see log shipping troubleshooting.