Skip to content

Commit 5f99011

Browse files
committed
clarified a bit more the configuration files
1 parent b6ac1f1 commit 5f99011

File tree

1 file changed

+18
-16
lines changed

1 file changed

+18
-16
lines changed

packetbeat.conf

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,29 @@
11
###
2-
### PacketBeat configuration file.
2+
### Packetbeat Agent configuration file.
33
###
4-
### PacketBeat is a protocol monitoring service that
4+
### Packetbeat is a protocol monitoring service that
55
### works by sniffing the network traffic between your application
6-
### components. It dumps the results into elasticsearch.
6+
### components. It dumps the results into Elasticsearch.
77
###
8-
### Go to http://packetbeat.com/gettingstarted for more details.
8+
### Go to http://packetbeat.com/getstarted for more details.
99
###
1010

11+
[elasticsearch]
12+
# Set the host and port where to find Elasticsearch.
13+
host = "localhost"
14+
port = 9200
15+
1116
[interfaces]
1217
# Select on which network interfaces to sniff. You can use the "any"
1318
# keyword to sniff on all connected interfaces.
1419
device = "any"
1520

16-
[elasticsearch]
17-
# Set the host and port where to find ElasticSearch. Most likely you
18-
# need to change the port.
19-
host = "localhost"
20-
port = 9200
21-
21+
[protocols]
2222
# Configure which protocols to monitor and on which ports are they
2323
# running. You can disable a given protocol by commenting out its
2424
# configuration.
25-
[protocols]
2625
[protocols.http]
27-
ports = [80, 8080, 8081, 5000, 8002]
26+
ports = [80, 8080, 8000, 5000, 8002]
2827

2928
[protocols.mysql]
3029
ports = [3306]
@@ -33,8 +32,7 @@ port = 9200
3332
ports = [6379]
3433

3534
[procs]
36-
# Uncomment the following line to disable reading the processes from
37-
# the proc file system.
35+
# Uncomment the following line to disable the process monitoring.
3836
# dont_read_from_proc = true
3937

4038
# Which processes to monitor and how to find them. The processes can
@@ -45,21 +43,25 @@ port = 9200
4543
[procs.monitored.nginx]
4644
cmdline_grep = "nginx"
4745

46+
[procs.monitored.app]
47+
cmdline_grep = "gunicorn"
48+
4849
[agent]
4950
# The name of the agent as it will show up in the web interface. If not
5051
# defined, we will just use the hostname.
5152
#
5253
#name=
5354

5455
[runoptions]
55-
# The PacketBeats agent can drop privileges after creating the sniffing
56+
# The Packetbeat agent can drop privileges after creating the sniffing
5657
# socket. Root access is required for opening the socket but everything
5758
# else requires no privileges. Therefore, it is strongly recommended
5859
# to have the Agent switch users after the initialization phase.
59-
# The following two settings set the User Id and the Group Id under
60+
# The following two settings set the User Id and the Group Id under
6061
# which the Agent will run.
6162
# Warning: Because on Linux Setuid doesn't change the uid of all threads,
6263
# the Go garbage collector will continue to run as root.
64+
# Note: Process monitoring only works when running as root.
6365
#uid=501
6466
#gid=501
6567

0 commit comments

Comments
 (0)