Skip to content

soltius/chef-cloudwatch-logs

 
 

Repository files navigation

Description

Installs the CloudWatch Logs client and enables easy configuration of multiple logs via attributes.

Supported OS

Currently all linux OS's and Windows 2012/2016 are supported.

On Amazon Linux the yum package will be used.

Permissions

Please create a Role in your IAM profile giving the following policies to your role:

** CloudWatchEventsInvocationAccess** AmazonEC2RoleforSSM

  • SSM is for Windows instances

If you want a not very intrusive Role for your SSM allowances, you can create a new policy with the following so you would have just the necessary to run it:

"Action": [
                "ssm:UpdateInstanceInformation",
                "ssm:ListCommands",
                "ssm:SendCommand",
                "ssm:ListCommandInvocations",
                "ssm:GetDocument"
            ]

Usage

Logs are configured by appending to the ['cwlogs']['logfiles'] attribute from any recipe. You can configure as many logs as needed. Simply include the default cwlogs recipe in your runlist after all recipes which define a log.

If you do not want each chef run to risk pulling in the latest cloudwatch installer from AWS, then you can set the following attribute to false:

['cwlogs']['attempt_upgrade'] = false

The CloudWatch agent no longer supports installs using Python 2.6. On systems with Python 2.6 set as default, you will need a newerv version of Python installed (2.7 minimum). You can then set the default['cwlogs']['python_bin'] attribute to point to the >= 2.7 executable.

default['cwlogs']['python_bin'] = '/usr/bin/python2.7'

** Windows uses Python 3.4 at the moment of this document**

Some systems require a root SSL certificate in order for python/pip to access remote https endpoints. For that purpose, you can specify a location to your system's root cert bundle using the default['cwlogs']['ca_bundle'] attribute.

default['cwlogs']['ca_bundle'] = '/path/to/my/bundle.pem'

You may want to provide your own installation file instead of using the default location from Amazon. To do so, update the default['cwlogs']['installation_file_source'] attribute.

default['cwlogs']['installation_file_source'] = 'https://your.internal.domain.org/path/to/installer.py'
default['cwlogs']['installation_file_source'] = '/path/on/your/filesystem'

Examples

default['cwlogs']['logfiles']['mysite-httpd_access'] = {
  :log_stream_name  => '{instance_id}-{hostname}',
  :log_group_name   => 'mysite-httpd_access-group',
  :file             => '/var/log/httpd/mysite.com/access_log',
  :datetime_format  => '%d/%b/%Y:%H:%M:%S %z',
  :initial_position => 'end_of_file'
}

default['cwlogs']['logfiles']['mysite-httpd_error'] = {
  :log_stream_name  => '{instance_id}-{hostname}',
  :log_group_name   => 'mysite-httpd_error-group',
  :file             => '/var/log/httpd/mysite.com/error_log',
  :datetime_format  => '%d/%b/%Y:%H:%M:%S %z',
  :initial_position => 'end_of_file'
}

default['cwlogs']['logfiles']['mysite-mod_security_log'] = {
  :log_stream_name          => '{instance_id}-{hostname}',
  :log_group_name           => 'mysite-mod_security_log',
  :file                     => '/var/log/modsec_audit.log',
  :datetime_format          => '[%d/%b/%Y:%H:%M:%S %z]',
  :multi_line_start_pattern => '^--([0-9a-fA-F]*){8}-[A]{1}--',
  :initial_position         => 'end_of_file'
}

Windows

default['cwlogs']['logfiles']['mysite-httpd-access'] = {
  :fullname  => 'full description',
  :log_stream_name   => 'mysite-httpd_access-group',
  :log_group_name    => '/var/log/httpd/mysite.com/access_log',
  :datetime_format  => '%d/%b/%Y:%H:%M:%S %z',
  :file => 'C:\Program Files\logs'
}

In JSON:

{
  "cwlogs": {
    "logfiles": {
      "mysite-httpd-access": {
	    "fullname": "full description",
	    "log_stream_name": "mysite https access group",
	    "log_group_name": "default",
	    "file": "C:\\Program Files\\logs"
	  }
    }
  }
}

To know more about Cloudwatch JSON for windows please refer to this documentation: AWS Cloudwatch JSON And as a better example: https://gist.github.com/babakc/cffce532d36a220bf6bf90b3c4feb563

This file will be stored as: C:\Program Files\Amazon\SSM\Plugins\awsCloudWatch\AWS.EC2.Windows.CloudWatch.json

Linux

From any attributes file will generate the following CloudWatch Logs config:

[mysite-httpd_access]
log_stream_name = {instance_id}-{hostname}
log_group_name = mysite-httpd_access-group
file = /var/log/httpd/mysite.com/access_log
datetime_format = %d/%b/%Y:%H:%M:%S %z
initial_position = end_of_file

[mysite-httpd_error]
log_stream_name = {instance_id}-{hostname}
log_group_name = mysite-httpd_error-group
file = /var/log/httpd/mysite.com/error_log
datetime_format = %d/%b/%Y:%H:%M:%S %z
initial_position = end_of_file

[mysite-mod_security_log]
log_stream_name = {instance_id}-{hostname}
log_group_name = mysite-mod_security_log
file = /var/log/modsec_audit.log
datetime_format = [%d/%b/%Y:%H:%M:%S %z]
multi_line_start_pattern = ^--([0-9a-fA-F]*){8}-[A]{1}--
initial_position = end_of_file

All hash elements will pass through to the config file, so for example you can use encoding or any other supported config element.

See the AWS CloudWatch Logs configuration reference for details.

About

Chef recipe for CloudWatch Logs

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Ruby 86.0%
  • HTML 14.0%