Name: devsecops-log-forwarding
Owner: U.S. General Services Administration
Description: WORK IN PROGRESS
Created: 2018-01-23 16:04:13.0
Updated: 2018-01-24 21:53:42.0
Pushed: 2018-01-26 19:51:11.0
Size: 66
Language: HCL
GitHub Committers
User | Most Recent Commit | # Commits |
---|
Other Committers
User | Most Recent Commit | # Commits |
---|
This is a Terraform module that creates infrastructure for collecting and forwarding logs. The module creates an autoscaling fluentd cluster in Amazon Web Services (AWS).
This is needed at GSA because we need logs to be forwarded to our security team for compliance and incident response reasons, as well as whatever logging system the team is using. It can be tricky to configure multiple logging endpoints for syslog agents on every instance; this way, changes to the forwarding can be done in one place.
For the “tenant's logging system”, we recommend our EKK stack.
Install dependencies.
From the root of the repository, install Python dependencies.
nv install
nv shell
Note that in some cases, you may have to force pipenv to use python 3.6:
```sh
pipenv --python 3.6 install
pipenv --python 3.6 shell
```
Set up test infrastructure.
est
aform init
aform apply
Run tests.
on3 test.py