-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better logging #1922
Comments
Related to #1931 |
Log sources are:
I think our working assumption was that using the Azure logging resources would mean we are easily able to ingest logs from Azure resources, whereas using an alternative log manager would involve lots of work to ingest logs. The number of things which Azure monitor can ingest natively is fairly limited though so there might not be such a big advantage to using it. |
Additional logs to investigate:
|
Logging from container instances https://learn.microsoft.com/en-us/azure/container-instances/monitor-azure-container-instances
Seems like this must be configured when deploying a container group. In |
|
One complexity is that network flow logs require a Network Watcher. https://learn.microsoft.com/en-us/azure/network-watcher/network-watcher-overview This means we need to import the existing network watcher resource rather than create it and manage it ourselves (and assume, if there is not one already, that it'll be created during our deployment). May be an issue if users have already created their own network watcher with a non-default name etc |
It's fine to postpone network flow logs for a future release if it's not a quick fix. Better to have some things working (and know which ones need to be added later) than have nothing ready until it all is. |
Looks like there isn't anything useful we can get out of the virtual networks/NSGs. Metrics are not supported by log analytics, and @craddm noted an issue with the flow logs (not actually sure what those are). |
Looks like virtual network flow logs are the new thing (NSG flow logs deprecated from 2027). Not sure if they are any easier to use though. |
It seems like most 'Azure native' resources collect logs and metrics, which you can collect in a log analytics workspace using a Diagnostic setting (in pulumi). |
Also won't be able to create new NSG flow logs from June 30 2025 Assume the pulumi flow logs are virtual network flow logs rather than NSG flow logs, but it's not explicitly stated https://www.pulumi.com/registry/packages/azure-native/api-docs/network/flowlog/ |
flow logs should keep track of things like network traffic (source and destinations) and how the NSG rules are being applied |
I think that is what we would want. But it sounds difficult because it has to use the subscription wide network watcher? If so, I think it would be OK to leave it for now. |
Yes, I'm not sure if there's a way to get Pulumi to import it if it exists or create it if it doesn't - I think it's a problem like this Pulumi issue |
✅ Checklist
🍓 Suggested change
We should ensure that our logging is improved by:
🚂 How could this be done?
Could consolidate in LogAnalyticsWorkspace and send to e.g. GreyLog? Not sure on the best way to alert
Task list
The text was updated successfully, but these errors were encountered: