Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Adding a pattern for AWS for FluentBit with ContainerInsights and Kubelet monitoring integration. #1770

Closed

Conversation

rodrigobersa
Copy link
Contributor

Description

Motivation and Context

Due the requests of features related to AWS for Fluentbit, and the lack of an existing examples for that, I'm adding this pattern to address those.

How was this change tested?

  • Yes, I have tested the PR using my local account setup (Provide any test evidence report under Additional Notes)
  • Yes, I have updated the docs for this feature
  • Yes, I ran pre-commit run -a with this PR

Additional Notes

@rodrigobersa rodrigobersa requested a review from a team as a code owner September 20, 2023 17:19
@rodrigobersa rodrigobersa temporarily deployed to EKS Blueprints Test September 20, 2023 17:19 — with GitHub Actions Inactive
@rodrigobersa rodrigobersa changed the title feat: Adding a AWS for FluentBit with ContainerInsights and Kubelet monitoring integration. feat: Adding a pattern for AWS for FluentBit with ContainerInsights and Kubelet monitoring integration. Sep 20, 2023
tags = local.tags
}

resource "aws_vpc_endpoint" "guardduty" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

copy+paste error? do we need these guardduty resource?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, I wanted to add GuardDuty. We don't really need it, however since we are showing a
"monitoring" pattern, I think it's interesting to add.

@@ -0,0 +1,337 @@
# AWS for FluentBit with ContainerInsights and Kubelet monitoring.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll offer an alternative thought - what about showing this as a snippet?

  1. Most of the detail is in the README (and its great info), very little has to do with the Terraform
  2. I suspect there are a number of different logging configurations/scenarios that users may inquire about
  3. There isn't anything specific to the cluster itself

What do you think?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You mean the whole main.tf as a snippet?

  1. Agreed, in fact nothing is related to Terraform, the init/plan/apply are provided by the link on the Deploy section.
  2. Yes, there are but not sure what is really useful or adopted by customers
  3. Nope!

What's your goal?

@github-actions
Copy link
Contributor

This PR has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this PR will be closed in 10 days

@github-actions github-actions bot added the stale label Oct 22, 2023
Copy link
Contributor

github-actions bot commented Nov 2, 2023

Pull request closed due to inactivity.

@github-actions github-actions bot closed this Nov 2, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants