Timestamps don`t match I have and ELK (Elasticsearch, Logstash and Kibana) instance running and Filebeat sending logs from other machines, and I noticed that logs are shown in Kibana in different order that they arrived to the server (as you can see in the attached picture), for example, this is what is shown in Kibana, the second column is kibana timestamp and the third column is the server timestamp:
February 9th 2017, 11:53:11.714 11:53:04,904
February 9th 2017, 11:53:11.714 11:53:05,579
February 9th 2017, 11:53:11.714 11:53:05,581
February 9th 2017, 11:53:11.714 11:53:05,591
February 9th 2017, 11:53:11.714 11:53:04,441
February 9th 2017, 11:53:11.714 11:53:05,589
What I see in the log file is:
11:53:04,441
11:53:04,904
11:53:05,579
11:53:05,581
11:53:05,589
11:53:05,591
Is there any option to see the logs in Kibana in the same order that they are shown in the server? I was looking for it but I didn`t see any question which treat this topic, but I saw that it could be changing the Logstash configuration file 10-syslog-filter.conf, this is mine:
filter {
if [type] == "syslog" {
grok {
match => { "message" => "%{SYSLOGTIMESTAMP:syslog_timestamp} %{SYSLOGHOST:syslog_hostname} %{DATA:syslog_program}(?:\[%{POSINT:syslog_pid}\])?: %{GREEDYDATA:syslog_message}" }
add_field => [ "received_at", "%{@timestamp}" ]
add_field => [ "received_from", "%{host}" ]
}
syslog_pri { }
date {
match => [ "syslog_timestamp", "MMM d HH:mm:ss", "MMM dd HH:mm:ss" ]
}
}
}
Thanks in advance.