Installing and configuring MI Log File Collector (Filebeat)
Filebeat for Granta MI log aggregation is delivered in the MI Log File Collector, an installation and configuration 'wrapper' that ensures Filebeat is installed on a Granta MI application server with the correct configuration settings for MI log aggregation.
- Ensure that Elasticsearch and Kibana are already configured and running on your log aggregation Elasticsearch instance, as described in the previous topics.
- Ensure you have the Elasticsearch API key copied from Kibana on your log aggregation Elasticsearch server.
- Copy the ca.P12 certificate file from the config\certs folder on your log aggregation Elasticsearch instance to your Granta MI application server. This file holds the Elasticsearch CA and the private key for the CA.
On each node in the cluster:
- Log in using an account with Administrator privileges.
- Double-click the ca.P12 file you copied from your log aggregation Elasticsearch server and import the CA to the Local Machine Trusted Root Certification Authorities certificate store.
-
Install MI Log File Collector:
-
Create a Filebeat keystore and add the Log Collector Elasticsearch API key to
it. This will ensure that communications between Filebeat and Elasticsearch are
secure.
-
Navigate to the C:\ProgramData\Granta\Granta
MI\Filebeat\config folder, open
MILogFileCollector.yml, and make the following changes
under
output.elasticsearch: - Save the changes to MILogFileCollector.yml.
-
Start the MI Log File Collector Windows service.
- From the Windows Start menu, click Run, type services.msc, and click OK.
- In the Services window, select the 'Granta MI Log File Collector Service' and click Start.