1
1
# ##
2
- # ## PacketBeat configuration file.
2
+ # ## Packetbeat Agent configuration file.
3
3
# ##
4
- # ## PacketBeat is a protocol monitoring service that
4
+ # ## Packetbeat is a protocol monitoring service that
5
5
# ## works by sniffing the network traffic between your application
6
- # ## components. It dumps the results into elasticsearch.
6
+ # ## components. It dumps the results into Elasticsearch.
7
7
# ##
8
- # ## Go to http://packetbeat.com/gettingstarted for more details.
8
+ # ## Go to http://packetbeat.com/getstarted for more details.
9
9
# ##
10
10
11
+ [elasticsearch ]
12
+ # Set the host and port where to find Elasticsearch.
13
+ host = " localhost"
14
+ port = 9200
15
+
11
16
[interfaces ]
12
17
# Select on which network interfaces to sniff. You can use the "any"
13
18
# keyword to sniff on all connected interfaces.
14
19
device = " any"
15
20
16
- [elasticsearch ]
17
- # Set the host and port where to find ElasticSearch. Most likely you
18
- # need to change the port.
19
- host = " localhost"
20
- port = 9200
21
-
21
+ [protocols ]
22
22
# Configure which protocols to monitor and on which ports are they
23
23
# running. You can disable a given protocol by commenting out its
24
24
# configuration.
25
- [protocols ]
26
25
[protocols .http ]
27
- ports = [80 , 8080 , 8081 , 5000 , 8002 ]
26
+ ports = [80 , 8080 , 8000 , 5000 , 8002 ]
28
27
29
28
[protocols .mysql ]
30
29
ports = [3306 ]
@@ -33,8 +32,7 @@ port = 9200
33
32
ports = [6379 ]
34
33
35
34
[procs ]
36
- # Uncomment the following line to disable reading the processes from
37
- # the proc file system.
35
+ # Uncomment the following line to disable the process monitoring.
38
36
# dont_read_from_proc = true
39
37
40
38
# Which processes to monitor and how to find them. The processes can
@@ -45,21 +43,25 @@ port = 9200
45
43
[procs .monitored .nginx ]
46
44
cmdline_grep = " nginx"
47
45
46
+ [procs .monitored .app ]
47
+ cmdline_grep = " gunicorn"
48
+
48
49
[agent ]
49
50
# The name of the agent as it will show up in the web interface. If not
50
51
# defined, we will just use the hostname.
51
52
#
52
53
# name=
53
54
54
55
[runoptions ]
55
- # The PacketBeats agent can drop privileges after creating the sniffing
56
+ # The Packetbeat agent can drop privileges after creating the sniffing
56
57
# socket. Root access is required for opening the socket but everything
57
58
# else requires no privileges. Therefore, it is strongly recommended
58
59
# to have the Agent switch users after the initialization phase.
59
- # The following two settings set the User Id and the Group Id under
60
+ # The following two settings set the User Id and the Group Id under
60
61
# which the Agent will run.
61
62
# Warning: Because on Linux Setuid doesn't change the uid of all threads,
62
63
# the Go garbage collector will continue to run as root.
64
+ # Note: Process monitoring only works when running as root.
63
65
# uid=501
64
66
# gid=501
65
67
0 commit comments