Skip to content

Commit 35128aa

Browse files
committed
Fix logs
1 parent 0e56a21 commit 35128aa

File tree

12 files changed

+10
-215
lines changed

12 files changed

+10
-215
lines changed

scenarios/AksOpenAiTerraform/terraform/main.tf

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,6 @@ module "virtual_network" {
5555
vnet_name = var.name_prefix == null ? "${random_string.prefix.result}${var.vnet_name}" : "${var.name_prefix}${var.vnet_name}"
5656
address_space = var.vnet_address_space
5757
log_analytics_workspace_id = module.log_analytics_workspace.id
58-
log_analytics_retention_days = var.log_analytics_retention_days
5958
tags = var.tags
6059

6160
subnets = [
@@ -118,7 +117,6 @@ module "container_registry" {
118117
admin_enabled = var.acr_admin_enabled
119118
georeplication_locations = var.acr_georeplication_locations
120119
log_analytics_workspace_id = module.log_analytics_workspace.id
121-
log_analytics_retention_days = var.log_analytics_retention_days
122120
tags = var.tags
123121

124122
}

scenarios/AksOpenAiTerraform/terraform/modules/aks/main.tf

Lines changed: 1 addition & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -111,79 +111,39 @@ resource "azurerm_kubernetes_cluster" "aks_cluster" {
111111
}
112112

113113
resource "azurerm_monitor_diagnostic_setting" "settings" {
114-
name = "DiagnosticsSettings"
114+
name = "AksDiagnosticsSettings"
115115
target_resource_id = azurerm_kubernetes_cluster.aks_cluster.id
116116
log_analytics_workspace_id = var.log_analytics_workspace_id
117117

118118
enabled_log {
119119
category = "kube-apiserver"
120-
121-
retention_policy {
122-
enabled = true
123-
days = var.log_analytics_retention_days
124-
}
125120
}
126121

127122
enabled_log {
128123
category = "kube-audit"
129-
130-
retention_policy {
131-
enabled = true
132-
days = var.log_analytics_retention_days
133-
}
134124
}
135125

136126
enabled_log {
137127
category = "kube-audit-admin"
138-
139-
retention_policy {
140-
enabled = true
141-
days = var.log_analytics_retention_days
142-
}
143128
}
144129

145130
enabled_log {
146131
category = "kube-controller-manager"
147-
148-
retention_policy {
149-
enabled = true
150-
days = var.log_analytics_retention_days
151-
}
152132
}
153133

154134
enabled_log {
155135
category = "kube-scheduler"
156-
157-
retention_policy {
158-
enabled = true
159-
days = var.log_analytics_retention_days
160-
}
161136
}
162137

163138
enabled_log {
164139
category = "cluster-autoscaler"
165-
166-
retention_policy {
167-
enabled = true
168-
days = var.log_analytics_retention_days
169-
}
170140
}
171141

172142
enabled_log {
173143
category = "guard"
174-
175-
retention_policy {
176-
enabled = true
177-
days = var.log_analytics_retention_days
178-
}
179144
}
180145

181146
metric {
182147
category = "AllMetrics"
183-
184-
retention_policy {
185-
enabled = true
186-
days = var.log_analytics_retention_days
187-
}
188148
}
189149
}

scenarios/AksOpenAiTerraform/terraform/modules/bastion_host/main.tf

Lines changed: 2 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -33,67 +33,37 @@ resource "azurerm_bastion_host" "bastion_host" {
3333
}
3434

3535
resource "azurerm_monitor_diagnostic_setting" "settings" {
36-
name = "DiagnosticsSettings"
36+
name = "BastionDiagnosticsSettings"
3737
target_resource_id = azurerm_bastion_host.bastion_host.id
3838
log_analytics_workspace_id = var.log_analytics_workspace_id
3939

4040
enabled_log {
4141
category = "BastionAuditLogs"
42-
43-
retention_policy {
44-
enabled = true
45-
days = var.log_analytics_retention_days
46-
}
4742
}
4843

4944
metric {
5045
category = "AllMetrics"
51-
52-
retention_policy {
53-
enabled = true
54-
days = var.log_analytics_retention_days
55-
}
5646
}
5747
}
5848

5949
resource "azurerm_monitor_diagnostic_setting" "pip_settings" {
60-
name = "DiagnosticsSettings"
50+
name = "BastionDdosDiagnosticsSettings"
6151
target_resource_id = azurerm_public_ip.public_ip.id
6252
log_analytics_workspace_id = var.log_analytics_workspace_id
6353

6454
enabled_log {
6555
category = "DDoSProtectionNotifications"
66-
67-
retention_policy {
68-
enabled = true
69-
days = var.log_analytics_retention_days
70-
}
7156
}
7257

7358
enabled_log {
7459
category = "DDoSMitigationFlowLogs"
75-
76-
retention_policy {
77-
enabled = true
78-
days = var.log_analytics_retention_days
79-
}
8060
}
8161

8262
enabled_log {
8363
category = "DDoSMitigationReports"
84-
85-
retention_policy {
86-
enabled = true
87-
days = var.log_analytics_retention_days
88-
}
8964
}
9065

9166
metric {
9267
category = "AllMetrics"
93-
94-
retention_policy {
95-
enabled = true
96-
days = var.log_analytics_retention_days
97-
}
9868
}
9969
}

scenarios/AksOpenAiTerraform/terraform/modules/container_registry/main.tf

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -44,34 +44,19 @@ resource "azurerm_user_assigned_identity" "acr_identity" {
4444
}
4545

4646
resource "azurerm_monitor_diagnostic_setting" "settings" {
47-
name = "DiagnosticsSettings"
47+
name = "ContainerDiagnosticsSettings"
4848
target_resource_id = azurerm_container_registry.acr.id
4949
log_analytics_workspace_id = var.log_analytics_workspace_id
5050

5151
enabled_log {
5252
category = "ContainerRegistryRepositoryEvents"
53-
54-
retention_policy {
55-
enabled = true
56-
days = var.log_analytics_retention_days
57-
}
5853
}
5954

6055
enabled_log {
6156
category = "ContainerRegistryLoginEvents"
62-
63-
retention_policy {
64-
enabled = true
65-
days = var.log_analytics_retention_days
66-
}
6757
}
6858

6959
metric {
7060
category = "AllMetrics"
71-
72-
retention_policy {
73-
enabled = true
74-
days = var.log_analytics_retention_days
75-
}
7661
}
7762
}

scenarios/AksOpenAiTerraform/terraform/modules/container_registry/variables.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,4 @@ variable "georeplication_locations" {
4545
variable "log_analytics_workspace_id" {
4646
description = "Specifies the log analytics workspace id"
4747
type = string
48-
}
49-
50-
variable "log_analytics_retention_days" {
51-
description = "Specifies the number of days of the retention policy"
52-
type = number
53-
default = 7
5448
}

scenarios/AksOpenAiTerraform/terraform/modules/diagnostic_setting/main.tf

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,6 @@ resource "azurerm_monitor_diagnostic_setting" "settings" {
1515
content {
1616
category = each.key
1717
enabled = true
18-
19-
retention_policy {
20-
enabled = var.retention_policy_enabled
21-
days = var.retention_policy_days
22-
}
2318
}
2419
}
2520

@@ -28,11 +23,6 @@ resource "azurerm_monitor_diagnostic_setting" "settings" {
2823
content {
2924
category = each.key
3025
enabled = true
31-
32-
retention_policy {
33-
enabled = var.retention_policy_enabled
34-
days = var.retention_policy_days
35-
}
3626
}
3727
}
3828
}

scenarios/AksOpenAiTerraform/terraform/modules/firewall/main.tf

Lines changed: 2 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -226,85 +226,45 @@ resource "azurerm_firewall_policy_rule_collection_group" "policy" {
226226
}
227227

228228
resource "azurerm_monitor_diagnostic_setting" "settings" {
229-
name = "DiagnosticsSettings"
229+
name = "FirewallDiagnosticsSettings"
230230
target_resource_id = azurerm_firewall.firewall.id
231231
log_analytics_workspace_id = var.log_analytics_workspace_id
232232

233233
enabled_log {
234234
category = "AzureFirewallApplicationRule"
235-
236-
retention_policy {
237-
enabled = true
238-
days = var.log_analytics_retention_days
239-
}
240235
}
241236

242237
enabled_log {
243238
category = "AzureFirewallNetworkRule"
244-
245-
retention_policy {
246-
enabled = true
247-
days = var.log_analytics_retention_days
248-
}
249239
}
250240

251241
enabled_log {
252242
category = "AzureFirewallDnsProxy"
253-
254-
retention_policy {
255-
enabled = true
256-
days = var.log_analytics_retention_days
257-
}
258243
}
259244

260245
metric {
261246
category = "AllMetrics"
262-
263-
retention_policy {
264-
enabled = true
265-
days = var.log_analytics_retention_days
266-
}
267247
}
268248
}
269249

270250
resource "azurerm_monitor_diagnostic_setting" "pip_settings" {
271-
name = "DiagnosticsSettings"
251+
name = "FirewallDdosDiagnosticsSettings"
272252
target_resource_id = azurerm_public_ip.pip.id
273253
log_analytics_workspace_id = var.log_analytics_workspace_id
274254

275255
enabled_log {
276256
category = "DDoSProtectionNotifications"
277-
278-
retention_policy {
279-
enabled = true
280-
days = var.log_analytics_retention_days
281-
}
282257
}
283258

284259
enabled_log {
285260
category = "DDoSMitigationFlowLogs"
286-
287-
retention_policy {
288-
enabled = true
289-
days = var.log_analytics_retention_days
290-
}
291261
}
292262

293263
enabled_log {
294264
category = "DDoSMitigationReports"
295-
296-
retention_policy {
297-
enabled = true
298-
days = var.log_analytics_retention_days
299-
}
300265
}
301266

302267
metric {
303268
category = "AllMetrics"
304-
305-
retention_policy {
306-
enabled = true
307-
days = var.log_analytics_retention_days
308-
}
309269
}
310270
}

scenarios/AksOpenAiTerraform/terraform/modules/key_vault/main.tf

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -31,34 +31,19 @@ resource "azurerm_key_vault" "key_vault" {
3131
}
3232

3333
resource "azurerm_monitor_diagnostic_setting" "settings" {
34-
name = "DiagnosticsSettings"
34+
name = "KeyVaultDiagnosticsSettings"
3535
target_resource_id = azurerm_key_vault.key_vault.id
3636
log_analytics_workspace_id = var.log_analytics_workspace_id
3737

3838
enabled_log {
3939
category = "AuditEvent"
40-
41-
retention_policy {
42-
enabled = true
43-
days = var.log_analytics_retention_days
44-
}
4540
}
4641

4742
enabled_log {
4843
category = "AzurePolicyEvaluationDetails"
49-
50-
retention_policy {
51-
enabled = true
52-
days = var.log_analytics_retention_days
53-
}
5444
}
5545

5646
metric {
5747
category = "AllMetrics"
58-
59-
retention_policy {
60-
enabled = true
61-
days = var.log_analytics_retention_days
62-
}
6348
}
6449
}

scenarios/AksOpenAiTerraform/terraform/modules/network_security_group/main.tf

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -33,26 +33,15 @@ resource "azurerm_network_security_group" "nsg" {
3333
}
3434

3535
resource "azurerm_monitor_diagnostic_setting" "settings" {
36-
name = "DiagnosticsSettings"
36+
name = "NetworkSecurityDiagnosticsSettings"
3737
target_resource_id = azurerm_network_security_group.nsg.id
3838
log_analytics_workspace_id = var.log_analytics_workspace_id
3939

4040
enabled_log {
4141
category = "NetworkSecurityGroupEvent"
42-
43-
retention_policy {
44-
enabled = true
45-
days = var.log_analytics_retention_days
46-
}
4742
}
4843

4944
enabled_log {
5045
category = "NetworkSecurityGroupRuleCounter"
51-
enabled = true
52-
53-
retention_policy {
54-
enabled = true
55-
days = var.log_analytics_retention_days
56-
}
5746
}
5847
}

0 commit comments

Comments
 (0)