Skip to content

Instantly share code, notes, and snippets.

azurerm-mssql-db

Terraform module designed to deplo names and tags for resources. Use terraform-null-label to implement a strict naming convention.

Requirements

Keybase proof

I hereby claim:

  • I am hutger on github.
  • I am lucasalbuq (https://keybase.io/lucasalbuq) on keybase.
  • I have a public key ASCOqG8eHs9hv4MjkDl--V2L4E8dHihx4ybLL0dyIBE5Owo

To claim this, I am signing this object:

Keybase proof

I hereby claim:

  • I am hutger on github.
  • I am lucasjr (https://keybase.io/lucasjr) on keybase.
  • I have a public key ASAMeTZkGiPt2bFclDgO6lYsQbThLsC8As3Nr4gLzQEaego

To claim this, I am signing this object:

Hands On

Configuration Procedures

Two scripts were created to execute the task. The first will be responsible for generating fake NGINX logs. The second will rotate the log file and upload it to AWS S3. Both scripts were developed in BASH, but could have been developed in other languages, such as Python, Ruby, Go, among others. The choice for BASH was due to the native support on Linux systems.

The proposed solution meets the requirements for the solution:

  • Will not send replicated log files;
  • The solution tends to consume few CPU resources of the hosts, considering that the scripts will be executed ad-hoc;
  • In case of interruption of some instances, the logs will continue to be rotated and transferred after system return;

Essay: Log Consolidation Problem

Scenarios Proposal

Logs are a critical part of any system because they allow the observation of what is happening in the environment and enables real-time and post-mortem analysis of interactions with our systems. In order to allow an effective and reliable analysis, criteria such as durability, safety, availability, searchability and speed are required.

  • Durability - Is the system's ability to retain logs permanently, so that they can be accessed and analyzed later;
  • Security - They are the resources that guarantee that the logs will be protected and integrated;
  • Availability - Ensuring that logs are accessible whenever it is necessary to harass them;
  • Searchability - Ability to find relevant information in the logs, from objective and clear methods;
  • Speed - Ability to quickly access information stored in the logs to meet the security requirements of the environment;