forked from elastic/beats
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpacketbeat.conf
72 lines (59 loc) · 2.03 KB
/
packetbeat.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
###
### Packetbeat Agent configuration file.
###
### Packetbeat is a protocol monitoring service that
### works by sniffing the network traffic between your application
### components. It dumps the results into Elasticsearch.
###
### Go to http://packetbeat.com/getstarted for more details.
###
[elasticsearch]
# Set the host and port where to find Elasticsearch.
host = "localhost"
port = 9200
[interfaces]
# Select on which network interfaces to sniff. You can use the "any"
# keyword to sniff on all connected interfaces.
device = "any"
[protocols]
# Configure which protocols to monitor and on which ports are they
# running. You can disable a given protocol by commenting out its
# configuration.
[protocols.http]
ports = [80, 8080, 8000, 5000, 8002]
[protocols.mysql]
ports = [3306]
[protocols.redis]
ports = [6379]
[procs]
# Uncomment the following line to disable the process monitoring.
# dont_read_from_proc = true
# Which processes to monitor and how to find them. The processes can
# be found by searching their command line by a given string.
[procs.monitored.mysqld]
cmdline_grep = "mysqld"
[procs.monitored.nginx]
cmdline_grep = "nginx"
[procs.monitored.app]
cmdline_grep = "gunicorn"
[agent]
# The name of the agent as it will show up in the web interface. If not
# defined, we will just use the hostname.
#
#name=
[runoptions]
# The Packetbeat agent can drop privileges after creating the sniffing
# socket. Root access is required for opening the socket but everything
# else requires no privileges. Therefore, it is strongly recommended
# to have the Agent switch users after the initialization phase.
# The following two settings set the User Id and the Group Id under
# which the Agent will run.
# Warning: Because on Linux Setuid doesn't change the uid of all threads,
# the Go garbage collector will continue to run as root.
# Note: Process monitoring only works when running as root.
#uid=501
#gid=501
[logging]
# These are debug helpers to control the verbosity of logging.
selectors = ["pinger"]
# vim: set ft=toml: