- Packetbeat Reference: other versions:
- Packetbeat overview
- Quick start: installation and configuration
- Set up and run
- Upgrade Packetbeat
- Configure
- Traffic sniffing
- Network flows
- Protocols
- Processes
- General settings
- Project paths
- Output
- Kerberos
- SSL
- Index lifecycle management (ILM)
- Elasticsearch index template
- Kibana endpoint
- Kibana dashboards
- Processors
- Define processors
- add_cloud_metadata
- add_cloudfoundry_metadata
- add_docker_metadata
- add_fields
- add_host_metadata
- add_id
- add_kubernetes_metadata
- add_labels
- add_locale
- add_network_direction
- add_nomad_metadata
- add_observer_metadata
- add_process_metadata
- add_tags
- append
- community_id
- convert
- copy_fields
- decode_base64_field
- decode_duration
- decode_json_fields
- decode_xml
- decode_xml_wineventlog
- decompress_gzip_field
- detect_mime_type
- dissect
- dns
- drop_event
- drop_fields
- extract_array
- fingerprint
- include_fields
- move_fields
- rate_limit
- registered_domain
- rename
- replace
- syslog
- translate_sid
- truncate_fields
- urldecode
- Internal queue
- Logging
- HTTP endpoint
- Instrumentation
- Feature flags
- packetbeat.reference.yml
- How to guides
- Exported fields
- AMQP fields
- Beat fields
- Cassandra fields
- Cloud provider metadata fields
- Common fields
- DHCPv4 fields
- DNS fields
- Docker fields
- ECS fields
- Flow Event fields
- Host fields
- HTTP fields
- ICMP fields
- Jolokia Discovery autodiscover provider fields
- Kubernetes fields
- Memcache fields
- MongoDb fields
- MySQL fields
- NFS fields
- PostgreSQL fields
- Process fields
- Raw fields
- Redis fields
- SIP fields
- Thrift-RPC fields
- Detailed TLS fields
- Transaction Event fields
- Measurements (Transactions) fields
- Monitor
- Secure
- Visualize Packetbeat data in Kibana
- Troubleshoot
- Get help
- Debug
- Understand logged metrics
- Record a trace
- Common problems
- Dashboard in Kibana is breaking up data fields incorrectly
- Packetbeat doesn’t see any packets when using mirror ports
- Packetbeat can’t capture traffic from Windows loopback interface
- Packetbeat is missing long running transactions
- Packetbeat isn’t capturing MySQL performance data
- Packetbeat uses too much bandwidth
- Error loading config file
- Found unexpected or unknown characters
- Logstash connection doesn’t work
- Publishing to Logstash fails with "connection reset by peer" message
- @metadata is missing in Logstash
- Not sure whether to use Logstash or Beats
- SSL client fails to connect to Logstash
- Monitoring UI shows fewer Beats than expected
- Dashboard could not locate the index-pattern
- High RSS memory usage due to MADV settings
- Fields show up as nested JSON in Kibana
- Contribute to Beats
Run Packetbeat on Docker
editRun Packetbeat on Docker
editDocker images for Packetbeat are available from the Elastic Docker registry. The base image is centos:7.
A list of all published Docker images and tags is available at www.docker.elastic.co.
These images are free to use under the Elastic license. They contain open source and free commercial features and access to paid commercial features. Start a 30-day trial to try out all of the paid commercial features. See the Subscriptions page for information about Elastic license levels.
Pull the image
editObtaining Packetbeat for Docker is as simple as issuing a docker pull
command
against the Elastic Docker registry.
docker pull docker.elastic.co/beats/packetbeat:8.16.4
Alternatively, you can download other Docker images that contain only features available under the Apache 2.0 license. To download the images, go to www.docker.elastic.co.
Optional: Verify the image
editYou can use the Cosign application to verify the Packetbeat Docker image signature.
wget https://artifacts.elastic.co/cosign.pub cosign verify --key cosign.pub docker.elastic.co/beats/packetbeat:8.16.4
The cosign
command prints the check results and the signature payload in JSON format:
Verification for docker.elastic.co/beats/packetbeat:8.16.4 -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The signatures were verified against the specified public key
Run the Packetbeat setup
editRunning Packetbeat with the setup command will create the index pattern and load visualizations , dashboards, and machine learning jobs. Run this command:
docker run --rm \ --cap-add=NET_ADMIN \ docker.elastic.co/beats/packetbeat:8.16.4 \ setup -E setup.kibana.host=kibana:5601 \ -E output.elasticsearch.hosts=["elasticsearch:9200"]
Substitute your Kibana and Elasticsearch hosts and ports. |
|
If you are using the hosted Elasticsearch Service in Elastic Cloud, replace
the |
-E cloud.id=<Cloud ID from Elasticsearch Service> \ -E cloud.auth=elastic:<elastic password>
Run Packetbeat on a read-only file system
editIf you’d like to run Packetbeat in a Docker container on a read-only file
system, you can do so by specifying the --read-only
option.
Packetbeat requires a stateful directory to store application data, so
with the --read-only
option you also need to use the --mount
option to
specify a path to where that data can be stored.
For example:
docker run --rm \ --mount type=bind,source=$(pwd)/data,destination=/usr/share/packetbeat/data \ --read-only \ docker.elastic.co/beats/packetbeat:8.16.4
Configure Packetbeat on Docker
editThe Docker image provides several methods for configuring Packetbeat. The conventional approach is to provide a configuration file via a volume mount, but it’s also possible to create a custom image with your configuration included.
Example configuration file
editDownload this example configuration file as a starting point:
curl -L -O https://raw.githubusercontent.com/elastic/beats/8.16/deploy/docker/packetbeat.docker.yml
Volume-mounted configuration
editOne way to configure Packetbeat on Docker is to provide packetbeat.docker.yml
via a volume mount.
With docker run
, the volume mount can be specified like this.
docker run -d \ --name=packetbeat \ --user=packetbeat \ --volume="$(pwd)/packetbeat.docker.yml:/usr/share/packetbeat/packetbeat.yml:ro" \ --cap-add="NET_RAW" \ --cap-add="NET_ADMIN" \ --network=host \ docker.elastic.co/beats/packetbeat:8.16.4 \ --strict.perms=false -e \ -E output.elasticsearch.hosts=["elasticsearch:9200"]
Customize your configuration
editThe packetbeat.docker.yml
downloaded earlier should be customized for your environment. See Configure for more details. Edit the configuration file and customize it to match your environment then re-deploy your Packetbeat container.
Custom image configuration
editIt’s possible to embed your Packetbeat configuration in a custom image. Here is an example Dockerfile to achieve this:
FROM docker.elastic.co/beats/packetbeat:8.16.4 COPY --chown=root:packetbeat packetbeat.yml /usr/share/packetbeat/packetbeat.yml
Required network capabilities
editUnder Docker, Packetbeat runs as a non-root user, but requires some privileged
network capabilities to operate correctly. Ensure that the NET_ADMIN
capability is available to the container.
docker run --cap-add=NET_ADMIN docker.elastic.co/beats/packetbeat:8.16.4
Capture traffic from the host system
editBy default, Docker networking will connect the Packetbeat container to an
isolated virtual network, with a limited view of network traffic. You may wish
to connect the container directly to the host network in order to see traffic
destined for, and originating from, the host system. With docker run
, this can
be achieved by specifying --network=host
.
docker run --cap-add=NET_ADMIN --network=host docker.elastic.co/beats/packetbeat:8.16.4
On Windows and MacOS, specifying --network=host
will bind the
container’s network interface to the virtual interface of Docker’s embedded
Linux virtual machine, not to the physical interface of the host system.
On this page
- Pull the image
- Optional: Verify the image
- Run the Packetbeat setup
- Run Packetbeat on a read-only file system
- Configure Packetbeat on Docker
- Example configuration file
- Volume-mounted configuration
- Customize your configuration
- Custom image configuration
- Required network capabilities
- Capture traffic from the host system