Skip to content

Commit 9aecff1

Browse files
authored
feat(logs): AWSX-1592 Move dms, docdb, fsx and opensearch to logs-bac… (#939)
* feat(logs): AWSX-1592 Move dms, docdb, fsx and opensearch to logs-backend Signed-off-by: Vincent Boutour <[email protected]> * feat(aws): AWSX-1592 Move eks support to logs-backend Signed-off-by: Vincent Boutour <[email protected]> --------- Signed-off-by: Vincent Boutour <[email protected]>
1 parent d7f492e commit 9aecff1

File tree

6 files changed

+0
-254
lines changed

6 files changed

+0
-254
lines changed

aws/logs_monitoring/steps/enums.py

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,9 @@ class AwsEventSource(Enum):
77
CLOUDFRONT = "cloudfront"
88
CLOUDTRAIL = "cloudtrail"
99
CLOUDWATCH = "cloudwatch"
10-
DMS = "dms"
11-
DOCDB = "docdb"
12-
EKS = "eks"
1310
ELASTICSEARCH = "elasticsearch"
1411
ELB = "elb"
1512
FARGATE = "fargate"
16-
FSX = "aws.fsx"
1713
GUARDDUTY = "guardduty"
1814
IAMAUTHENTICATOR = "aws-iam-authenticator"
1915
KINESIS = "kinesis"
@@ -26,7 +22,6 @@ class AwsEventSource(Enum):
2622
MSK = "msk"
2723
MYSQL = "mysql"
2824
NETWORKFIREWALL = "network-firewall"
29-
OPENSEARCH = "opensearch"
3025
POSTGRESQL = "postgresql"
3126
ROUTE53 = "route53"
3227
S3 = "s3"
@@ -68,8 +63,6 @@ def __init__(self, string, event_source):
6863

6964
# e.g. carbon-black-cloud-forwarder/alerts/org_key=*****/year=2021/month=7/day=19/hour=18/minute=15/second=41/8436e850-7e78-40e4-b3cd-6ebbc854d0a2.jsonl.gz
7065
CARBONBLACK = ("carbon-black", AwsEventSource.CARBONBLACK)
71-
DMS = ("amazon_dms", AwsEventSource.DMS)
72-
DOCDB = ("amazon_documentdb", AwsEventSource.DOCDB)
7366
# e.g. AWSLogs/123456779121/elasticloadbalancing/us-east-1/2020/10/02/123456779121_elasticloadbalancing_us-east-1_app.alb.xxxxx.xx.xxx.xxx_x.log.gz
7467
ELB = ("elasticloadbalancing", AwsEventSource.ELB)
7568
GUARDDUTY = ("guardduty", AwsEventSource.GUARDDUTY)
@@ -94,20 +87,10 @@ def __init__(self, string, event_source):
9487

9588
# e.g. /aws/codebuild/my-project
9689
CLOUDTRAIL = ("_CloudTrail_", AwsEventSource.CLOUDTRAIL)
97-
# e.g. dms-tasks-test-instance
98-
DMS = ("dms-tasks", AwsEventSource.DMS)
99-
# e.g. /aws/docdb/yourClusterName/profile
100-
DOCDB = ("/aws/docdb", AwsEventSource.DOCDB)
101-
# e.g. /aws/eks/yourClusterName/profile
102-
EKS = ("/aws/eks", AwsEventSource.EKS)
103-
# e.g. /aws/fsx/windows/xxx
104-
FSX = ("/aws/fsx/windows", AwsEventSource.FSX)
10590
# e.g. /aws/kinesisfirehose/dev
10691
KINESIS = ("/aws/kinesis", AwsEventSource.KINESIS)
10792
# e.g. /aws/lambda/helloDatadog
10893
LAMBDA = ("/aws/lambda", AwsEventSource.LAMBDA)
109-
# e.g. /aws/opensearchservice/domains/my-cluster
110-
OPENSEARCH = ("/aws/opensearchservice/domains/", AwsEventSource.OPENSEARCH)
11194
# e.g. sns/us-east-1/123456779121/SnsTopicX
11295
SNS = ("sns/", AwsEventSource.SNS)
11396
SSM = ("/aws/ssm/", AwsEventSource.SSM)

aws/logs_monitoring/steps/handlers/awslogs_handler.py

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,6 @@ def handle(self, event):
6060
# then rebuild the arn of the monitored lambda using that name.
6161
if metadata[DD_SOURCE] == str(AwsEventSource.LAMBDA):
6262
self.process_lambda_logs(metadata, aws_attributes)
63-
# The EKS log group contains various sources from the K8S control plane.
64-
# In order to have these automatically trigger the correct pipelines they
65-
# need to send their events with the correct log source.
66-
if metadata[DD_SOURCE] == str(AwsEventSource.EKS):
67-
self.process_eks_logs(metadata, aws_attributes)
6863
# Create and send structured logs to Datadog
6964
for log in logs["logEvents"]:
7065
merged = merge_dicts(log, aws_attributes.to_dict())
@@ -183,20 +178,6 @@ def get_state_machine_arn(self, aws_attributes):
183178
logger.debug("Unable to get state_machine_arn: %s" % e)
184179
return ""
185180

186-
def process_eks_logs(self, metadata, aws_attributes):
187-
log_stream = aws_attributes.get_log_stream()
188-
if log_stream.startswith("kube-apiserver-audit-"):
189-
metadata[DD_SOURCE] = "kubernetes.audit"
190-
elif log_stream.startswith("kube-scheduler-"):
191-
metadata[DD_SOURCE] = "kube_scheduler"
192-
elif log_stream.startswith("kube-apiserver-"):
193-
metadata[DD_SOURCE] = "kube-apiserver"
194-
elif log_stream.startswith("kube-controller-manager-"):
195-
metadata[DD_SOURCE] = "kube-controller-manager"
196-
elif log_stream.startswith("authenticator-"):
197-
metadata[DD_SOURCE] = "aws-iam-authenticator"
198-
# In case the conditions above don't match we maintain eks as the source
199-
200181
# Lambda logs can be from either default or customized log group
201182
def process_lambda_logs(self, metadata, aws_attributes):
202183
lower_cased_lambda_function_name = self.get_lower_cased_lambda_function_name(

aws/logs_monitoring/tests/test_parsing.py

Lines changed: 0 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -78,18 +78,6 @@ def test_lambda_event(self):
7878
str(AwsEventSource.LAMBDA),
7979
)
8080

81-
def test_dms_event(self):
82-
self.assertEqual(
83-
parse_event_source({"awslogs": "logs"}, "dms-tasks-test-instance"),
84-
str(AwsEventSource.DMS),
85-
)
86-
self.assertEqual(
87-
parse_event_source(
88-
{"Records": ["logs-from-s3"]}, "AWSLogs/amazon_dms/my-s3.json.gz"
89-
),
90-
str(AwsEventSource.DMS),
91-
)
92-
9381
def test_sns_event(self):
9482
self.assertEqual(
9583
parse_event_source(
@@ -110,18 +98,6 @@ def test_kinesis_event(self):
11098
str(AwsEventSource.KINESIS),
11199
)
112100

113-
def test_docdb_event(self):
114-
self.assertEqual(
115-
parse_event_source({"awslogs": "logs"}, "/aws/docdb/testCluster/profile"),
116-
str(AwsEventSource.DOCDB),
117-
)
118-
self.assertEqual(
119-
parse_event_source(
120-
{"Records": ["logs-from-s3"]}, "/amazon_documentdb/dev/123abc.zip"
121-
),
122-
str(AwsEventSource.DOCDB),
123-
)
124-
125101
def test_vpc_event(self):
126102
self.assertEqual(
127103
parse_event_source({"awslogs": "logs"}, "abc123_my_vpc_loggroup"),
@@ -216,15 +192,6 @@ def test_cloudfront_event(self):
216192
str(AwsEventSource.S3),
217193
)
218194

219-
def test_eks_event(self):
220-
self.assertEqual(
221-
parse_event_source(
222-
{"awslogs": "logs"},
223-
"/aws/eks/control-plane/cluster",
224-
),
225-
str(AwsEventSource.EKS),
226-
)
227-
228195
def test_elasticsearch_event(self):
229196
self.assertEqual(
230197
parse_event_source({"awslogs": "logs"}, "/elasticsearch/domain"),
@@ -256,15 +223,6 @@ def test_carbon_black_event(self):
256223
str(AwsEventSource.CARBONBLACK),
257224
)
258225

259-
def test_opensearch_event(self):
260-
self.assertEqual(
261-
parse_event_source(
262-
{"awslogs": "logs"},
263-
"/aws/OpenSearchService/domains/my-opensearch-cluster/ES_APPLICATION_LOGS",
264-
),
265-
str(AwsEventSource.OPENSEARCH),
266-
)
267-
268226
def test_cloudwatch_source_if_none_found(self):
269227
self.assertEqual(
270228
parse_event_source({"awslogs": "logs"}, ""), str(AwsEventSource.CLOUDWATCH)

aws/logs_monitoring/tools/integration_tests/snapshots/cloudwatch_log_fsx_windows.json

Lines changed: 0 additions & 16 deletions
This file was deleted.

aws/logs_monitoring/tools/integration_tests/snapshots/cloudwatch_log_fsx_windows.json~snapshot

Lines changed: 0 additions & 155 deletions
This file was deleted.

aws/logs_monitoring/tools/integration_tests/tester/test_snapshots.py

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -154,11 +154,6 @@ def test_cloudwatch_log_custom_tags(self):
154154
snapshot_filename = f"{input_filename}~snapshot"
155155
self.compare_snapshot(input_filename, snapshot_filename)
156156

157-
def test_cloudwatch_log_fsx_windows(self):
158-
input_filename = f"{snapshot_dir}/cloudwatch_log_fsx_windows.json"
159-
snapshot_filename = f"{input_filename}~snapshot"
160-
self.compare_snapshot(input_filename, snapshot_filename)
161-
162157
def test_cloudwatch_log_lambda_invocation(self):
163158
input_filename = f"{snapshot_dir}/cloudwatch_log_lambda_invocation.json"
164159
snapshot_filename = f"{input_filename}~snapshot"

0 commit comments

Comments
 (0)