Sending data to Logstash is quick and simple to set up. If you have not already done so, please check out our Data Source Integration for Logstash before learning how to properly use the API key.
Adding security measures to safe-guard Logstash is highly recommended. There are a number of ways to add an authentication step to your request pipeline so that only authorised sources may ship logs to Logstash.
1. Add an API Key to every message
Sending the API key with each message is the most common and preferred way of authorising requests. This API key can be anything you like (such as a GUID or a special string value of your choice). Then you can use a Logstash filter to check if this key is included. If it is not included, you can drop the message as part of the filtering process. This method gives you far greater control over both ends of the authentication process.
For example, you can use Filebeat to send a log message that includes the API key:
And use a Logstash filter to drop all messages that do not match the expected API key value:
if [logstashApiKey] != "<your-api-key>"
2. Firewall Configuration / IP White-listing
The Logit platform provides Logstash Firewall Groups that allow you to manage and restrict which IP addresses can send data to your Stacks and which ports those restrictions apply to. Setting Firewall Groups improves Stack security by blocking all unauthorised traffic to ports you've specified.
3. Mutual TLS
Currently, this is a support request feature that can be set up by contacting our support team, here.