Install Elasticsearch, Logstash, and Kibana on Windows Server 2012 R2
Overview
Source: https://en.wikipedia.org/wiki/NetFlow
By analyzing the data provided by NetFlow, a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion. A typical flow monitoring setup (using NetFlow) consists of three main components:
- Flow exporter: aggregates packets into flows and exports flow records towards one or more flow collectors.
- Flow collector: responsible for reception, storage and pre-processing of flow data received from a flow exporter.
- Analysis application: analyzes received flow data in the context of intrusion detection or traffic profiling, for example.
In this tutorial, we will use:
- NetFlow generator (https://www.paessler.com/tools/netflowgenerator) as flow exporter
- nProbe (http://www.ntop.org/products/netflow/nprobe/) as flow collector
- Elasticsearch + Logstash + Kibana (ELK https://www.elastic.co) to receive, store, analyze, and display Netflow data
|
System Diagram |
The diagram above shows how Netflow data are processed.
A simple network diagram is created for this tutorial
|
Network Diagram |
ELK and nProbe will be installed on 192.168.1.50, and sample NetFlow data will be generated from 192.168.1.60.
Let's start by setting up an ELK stack on Windows Server 2012 R2