-
Notifications
You must be signed in to change notification settings - Fork 513
Expand file tree
/
Copy pathlog_analytics.tf
More file actions
145 lines (126 loc) · 7.04 KB
/
log_analytics.tf
File metadata and controls
145 lines (126 loc) · 7.04 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
resource "azurerm_log_analytics_workspace" "main" {
count = local.create_analytics_workspace ? 1 : 0
location = var.location
name = coalesce(var.cluster_log_analytics_workspace_name, trim("${var.prefix}-workspace", "-"))
resource_group_name = coalesce(var.log_analytics_workspace_resource_group_name, var.resource_group_name)
allow_resource_only_permissions = var.log_analytics_workspace_allow_resource_only_permissions
cmk_for_query_forced = var.log_analytics_workspace_cmk_for_query_forced
daily_quota_gb = var.log_analytics_workspace_daily_quota_gb
data_collection_rule_id = var.log_analytics_workspace_data_collection_rule_id
immediate_data_purge_on_30_days_enabled = var.log_analytics_workspace_immediate_data_purge_on_30_days_enabled
internet_ingestion_enabled = var.log_analytics_workspace_internet_ingestion_enabled
internet_query_enabled = var.log_analytics_workspace_internet_query_enabled
local_authentication_disabled = var.log_analytics_workspace_local_authentication_disabled
reservation_capacity_in_gb_per_day = var.log_analytics_workspace_reservation_capacity_in_gb_per_day
retention_in_days = var.log_retention_in_days
sku = var.log_analytics_workspace_sku
tags = merge(var.tags, (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
avm_git_commit = "e3dd48ea03e7fd9955145d5e1b985fb501c49d91"
avm_git_file = "log_analytics.tf"
avm_git_last_modified_at = "2024-05-20 06:53:31"
avm_git_org = "Azure"
avm_git_repo = "terraform-azurerm-aks"
avm_yor_trace = "f58cfe56-cff2-4552-8bf7-07e998fa28f3"
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/), (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
avm_yor_name = "main"
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
dynamic "identity" {
for_each = var.log_analytics_workspace_identity == null ? [] : [var.log_analytics_workspace_identity]
content {
type = identity.value.type
identity_ids = identity.value.identity_ids
}
}
lifecycle {
precondition {
condition = can(coalesce(var.cluster_log_analytics_workspace_name, var.prefix))
error_message = "You must set one of `var.cluster_log_analytics_workspace_name` and `var.prefix` to create `azurerm_log_analytics_workspace.main`."
}
}
}
locals {
azurerm_log_analytics_workspace_id = try(azurerm_log_analytics_workspace.main[0].id, null)
azurerm_log_analytics_workspace_location = try(azurerm_log_analytics_workspace.main[0].location, null)
azurerm_log_analytics_workspace_name = try(azurerm_log_analytics_workspace.main[0].name, null)
azurerm_log_analytics_workspace_resource_group_name = try(azurerm_log_analytics_workspace.main[0].resource_group_name, null)
}
data "azurerm_log_analytics_workspace" "main" {
count = local.query_datasource_for_log_analytics_workspace_location ? 1 : 0
name = var.log_analytics_workspace.name
resource_group_name = local.log_analytics_workspace.resource_group_name
}
resource "azurerm_log_analytics_solution" "main" {
count = local.create_analytics_solution ? 1 : 0
location = coalesce(local.log_analytics_workspace.location, try(data.azurerm_log_analytics_workspace.main[0].location, null))
resource_group_name = local.log_analytics_workspace.resource_group_name
solution_name = "ContainerInsights"
workspace_name = local.log_analytics_workspace.name
workspace_resource_id = local.log_analytics_workspace.id
tags = merge(var.tags, (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
avm_git_commit = "886c26d95843149cc2a58ae72edb31478faa2a8c"
avm_git_file = "main.tf"
avm_git_last_modified_at = "2023-07-20 06:04:07"
avm_git_org = "Azure"
avm_git_repo = "terraform-azurerm-aks"
avm_yor_trace = "5bcf0000-2dc6-441a-9825-6d582659aeb7"
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/), (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
avm_yor_name = "main"
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
plan {
product = "OMSGallery/ContainerInsights"
publisher = "Microsoft"
}
}
locals {
dcr_location = try(coalesce(try(local.log_analytics_workspace.location, null), try(data.azurerm_log_analytics_workspace.main[0].location, null)), null)
}
resource "azurerm_monitor_data_collection_rule" "dcr" {
count = (local.create_analytics_workspace && var.oms_agent_enabled) ? 1 : 0
name = "MSCI-${local.dcr_location}-${azurerm_kubernetes_cluster.main.name}"
resource_group_name = var.resource_group_name
location = local.dcr_location
tags = var.tags
destinations {
log_analytics {
workspace_resource_id = local.log_analytics_workspace.id
name = local.log_analytics_workspace.name
}
}
data_flow {
streams = var.monitor_data_collection_rule_extensions_streams
destinations = [local.log_analytics_workspace.name]
}
data_flow {
streams = ["Microsoft-Syslog"]
destinations = [local.log_analytics_workspace.name]
}
data_sources {
syslog {
streams = ["Microsoft-Syslog"]
facility_names = var.monitor_data_collection_rule_data_sources_syslog_facilities
log_levels = var.monitor_data_collection_rule_data_sources_syslog_levels
name = "sysLogsDataSource"
}
extension {
streams = var.monitor_data_collection_rule_extensions_streams
extension_name = "ContainerInsights"
extension_json = jsonencode({
"dataCollectionSettings" : {
interval = var.data_collection_settings.data_collection_interval
namespaceFilteringMode = var.data_collection_settings.namespace_filtering_mode_for_data_collection
namespaces = var.data_collection_settings.namespaces_for_data_collection
enableContainerLogV2 = var.data_collection_settings.container_log_v2_enabled
}
})
name = "ContainerInsightsExtension"
}
}
description = "DCR for Azure Monitor Container Insights"
}
resource "azurerm_monitor_data_collection_rule_association" "dcra" {
count = (local.create_analytics_workspace && var.oms_agent_enabled) ? 1 : 0
name = "ContainerInsightsExtension"
target_resource_id = azurerm_kubernetes_cluster.main.id
data_collection_rule_id = azurerm_monitor_data_collection_rule.dcr[0].id
description = "Association of container insights data collection rule. Deleting this association will break the data collection for this AKS Cluster."
}