Skip to content

Commit a28b5ff

Browse files
chetanchoudhary-sumokimsauceamee-sumosumoanema
authored
SUMO-254678: Doc update Database apps migration V1 to V2 (#5009)
* SUMO-254678: Doc update Database apps migration V1 to V2 * Updating monitor part * updating fields section * updating FER section * Fixing Fields section * Addressing review comments from PR #5017 * Update sql-server.md * Update docs/integrations/amazon-aws/dynamodb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/amazon-aws/dynamodb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/amazon-aws/dynamodb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/cassandra.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/cassandra.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/cassandra.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/couchbase.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/couchbase.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/couchbase.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mariadb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/microsoft-azure/sql-server.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/observability/application-components.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mysql.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/redis.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/oracle.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mariadb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mariadb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/memcached.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/memcached.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/memcached.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mongodb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mongodb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mongodb.md Co-authored-by: Amee Lepcha <[email protected]> * Update docs/integrations/databases/mongodb.md Co-authored-by: Amee Lepcha <[email protected]> * Apply suggestions from code review Co-authored-by: Amee Lepcha <[email protected]> * Apply suggestions from code review Co-authored-by: Amee Lepcha <[email protected]> * Reverting DynamoDB documentation * Updating Cassandra Doc * Updating V2 Migrated Database apps docs to standard pattern * removing commented alert install section * reverting application-components --------- Co-authored-by: Kim (Sumo Logic) <[email protected]> Co-authored-by: Amee Lepcha <[email protected]> Co-authored-by: Alekh Nema <[email protected]>
1 parent d304e71 commit a28b5ff

File tree

13 files changed

+396
-1767
lines changed

13 files changed

+396
-1767
lines changed

docs/integrations/amazon-aws/dynamodb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,4 +222,4 @@ Use this dashboard to:
222222

223223
* Identify malicious IPs performing operations on DynamoDB tables using Sumo Logic Threat Intel.
224224

225-
<img src={useBaseUrl('img/integrations/amazon-aws/AWS-DynamoDB-Threat-Intel.png')} alt="Amazon DynamoDB" />
225+
<img src={useBaseUrl('img/integrations/amazon-aws/AWS-DynamoDB-Threat-Intel.png')} alt="Amazon DynamoDB" />

docs/integrations/databases/cassandra.md

Lines changed: 63 additions & 177 deletions
Large diffs are not rendered by default.

docs/integrations/databases/couchbase.md

Lines changed: 35 additions & 177 deletions
Large diffs are not rendered by default.

docs/integrations/databases/elasticsearch.md

Lines changed: 29 additions & 114 deletions
Original file line numberDiff line numberDiff line change
@@ -62,42 +62,8 @@ The Elasticsearch app is a unified logs and metrics app that helps you monitor t
6262

6363
Configuring log and metric collection for the Elasticsearch app includes the following tasks.
6464

65-
### Step 1: Configure Fields in Sumo Logic
6665

67-
Create the following Fields in Sumo Logic before configuring the collection. This ensures that your logs and metrics are tagged with relevant metadata required by the app dashboards. For information on setting up fields, see [Sumo Logic Fields](/docs/manage/fields).
68-
69-
<Tabs
70-
groupId="k8s-nonk8s"
71-
defaultValue="k8s"
72-
values={[
73-
{label: 'Kubernetes environments', value: 'k8s'},
74-
{label: 'Non-Kubernetes environments', value: 'non-k8s'},
75-
]}>
76-
77-
<TabItem value="k8s">
78-
79-
If you're using Elasticsearch in a Kubernetes environment, create the fields:
80-
81-
* `pod_labels_component`
82-
* `pod_labels_environment`
83-
* `pod_labels_db_system`
84-
* `pod_labels_db_cluster`
85-
86-
</TabItem>
87-
<TabItem value="non-k8s">
88-
89-
If you're using Elasticsearch in a non-Kubernetes environment, create the fields:
90-
91-
* `component`
92-
* `environment`
93-
* `db_system`
94-
* `db_cluster`
95-
* `pod`
96-
97-
</TabItem>
98-
</Tabs>
99-
100-
### Step 2: Configure Collection for Elasticsearch
66+
### Configure Collection for Elasticsearch
10167

10268
<Tabs
10369
groupId="k8s-nonk8s"
@@ -368,92 +334,37 @@ At this point, Elasticsearch logs should start flowing into Sumo Logic.
368334
</TabItem>
369335
</Tabs>
370336
371-
## Installing Elasticsearch Monitors
372-
373-
Sumo Logic has provided pre-packaged alerts available through [Sumo Logic monitors](/docs/alerts/monitors) to help you proactively determine if an Elasticsearch cluster is available and performing as expected. These monitors are based on metric and log data and include pre-set thresholds that reflect industry best practices and recommendations. For more information about individual alerts, see [Elasticsearch Alerts](#elasticsearch-alerts).
374-
375-
To install these monitors, you must have the **Manage Monitors** role capability. You can install monitors by importing a JSON file or using a Terraform script. There are limits to how many alerts can be enabled. For more information, see [Monitors](/docs/alerts/monitors/create-monitor) for details.
376-
377-
### Method 1: Importing a JSON file
378-
379-
1. Download the [JSON file](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/blob/main/monitor_packages/Elasticsearch/Elasticsearch.json) that describes the monitors.
380-
2. The [JSON](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/blob/main/monitor_packages/Elasticsearch/Elasticsearch.json) contains the alerts that are based on Sumo Logic searches that do not have any scope filters, and therefore will be applicable to all Elasticsearch clusters, the data for which has been collected via the instructions in the previous sections. However, if you would like to restrict these alerts to specific clusters or environments, update the JSON file by replacing the text `db_cluster=*` with `<Your Custom Filter>`. Custom filter examples:
381-
* For alerts applicable only to a specific cluster, your custom filter would be: `db_cluster=dev-elasticsearch-01`
382-
* For alerts applicable to all clusters that start with `elasticsearch-prod`, your custom filter would be: `db_cluster=elasticsearch-prod*`
383-
* For alerts applicable to a specific clusters, within a production environment, your custom filter would be: `db_cluster=dev-elasticsearch-01` AND `environment=prod`. This assumes you have set the optional environment tag while configuring collection.
384-
3. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Monitoring > Monitors**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Alerts > Monitors**. You can also click the **Go To...** menu at the top of the screen and select **Monitors**.
385-
4. Click **Add**.
386-
5. Click **Import**.
387-
6. On the **Import Content popup**, enter **Elasticsearch** in the Name field, paste in the JSON into the popup, and click **Import**.
388-
7. The monitors are created in a **Elasticsearch** folder. The monitors are disabled by default. See the [Monitors](/docs/alerts/monitors) topic for information about enabling monitors and configuring notifications or connections.
389337
390-
### Method 2: Using a Terraform script
338+
## Installing the Elasticsearch app
391339
392-
1. Generate a Sumo Logic access key and ID for a user that has the **Manage Monitors** role capability. For instructions, see [Access Keys](/docs/manage/security/access-keys).
393-
2. Download [Terraform 0.13](https://www.terraform.io/downloads.html) or later, and install it.
394-
3. Download the Sumo Logic Terraform package for Elasticsearch monitors. The alerts package is available in the Sumo Logic GitHub [repository](https://github.com/SumoLogic/terraform-sumologic-sumo-logic-monitor/tree/main/monitor_packages/Elasticsearch). You can either download it using the git clone command or as a zip file.
395-
4. Alert Configuration. After extracting the package, navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/Elasticsearch/` directory.
396-
* Edit the `Elasticsearch.auto.tfvars` file and add the Sumo Logic Access Key and Access ID from Step 1 and your Sumo Logic deployment. If you're not sure of your deployment, see [Sumo Logic Endpoints and Firewall Security](/docs/api/getting-started#sumo-logic-endpoints-by-deployment-and-firewall-security).
397-
```bash
398-
access_id = "<SUMOLOGIC ACCESS ID>"
399-
access_key = "<SUMOLOGIC ACCESS KEY>"
400-
environment = "<SUMOLOGIC DEPLOYMENT>"
401-
```
402-
* The Terraform script installs the alerts without any scope filters. If you would like to restrict the alerts to specific clusters or environments, update the `elasticsearch_data_source` variable. For example:
403-
* To configure alerts for a specific cluster, set `elasticsearch_data_source` to something like `db_cluster=elasticsearch.prod.01`
404-
* To configure alerts for all clusters in an environment, set `elasticsearch_data_source` to something like `environment=prod`
405-
* To configure alerts for multiple clusters using a wildcard, set `elasticsearch_data_source` to something like `db_cluster=elasticsearch-prod*`
406-
* To configure alerts for a specific clusters within a specific environment, set `elasticsearch_data_source` to something like `db_cluster=elasticsearch-1` and `environment=prod`. This assumes you have configured and applied Fields as described in [Configure Sumo Logic Fields](#step-1-configure-fields-in-sumo-logic).
407-
408-
All monitors are disabled by default on installation. To enable all of the monitors, set the `monitors_disabled` parameter to `false`. By default, the monitors will be located in a "Elasticsearch" folder on the **Monitors** page. To change the name of the folder, update the monitor folder name in the folder variable in the `Elasticsearch.auto.tfvars` file.
409-
5. If you want your alerts to send email or connection notifications, edit the `Elasticsearch_notifications.auto.tfvars` file to populate the `connection_notifications` and `email_notifications` sections. Examples are provided below. In the variable definition below, replace `<CONNECTION_ID>` with the connection ID of the Webhook connection. You can obtain the Webhook connection ID by calling the [Monitors API](https://api.sumologic.com/docs/#operation/listConnections).
410-
```bash title="Pagerduty connection example"
411-
connection_notifications = [
412-
{
413-
connection_type = "PagerDuty",
414-
connection_id = "<CONNECTION_ID>",
415-
payload_override = "{\"service_key\": \"your_pagerduty_api_integration_key\",\"event_type\": \"trigger\",\"description\": \"Alert: Triggered {{TriggerType}} for Monitor {{Name}}\",\"client\": \"Sumo Logic\",\"client_url\": \"{{QueryUrl}}\"}",
416-
run_for_trigger_types = ["Critical", "ResolvedCritical"]
417-
},
418-
{
419-
connection_type = "Webhook",
420-
connection_id = "<CONNECTION_ID>",
421-
payload_override = "",
422-
run_for_trigger_types = ["Critical", "ResolvedCritical"]
423-
}
424-
]
425-
```
340+
import AppInstall2 from '../../reuse/apps/app-install-only-k8s.md';
426341
427-
For information about overriding the payload for different connection types, see [Set Up Webhook Connections](/docs/alerts/webhook-connections/set-up-webhook-connections).
428-
429-
```bash title="Email notifications example"
430-
email_notifications = [
431-
{
432-
connection_type = "Email",
433-
recipients = ["[email protected]"],
434-
subject = "Monitor Alert: {{TriggerType}} on {{Name}}",
435-
time_zone = "PST",
436-
message_body = "Triggered {{TriggerType}} Alert on {{Name}}: {{QueryURL}}",
437-
run_for_trigger_types = ["Critical", "ResolvedCritical"]
438-
}
439-
]
440-
```
441-
6. Installation.
442-
1. Navigate to the `terraform-sumologic-sumo-logic-monitor/monitor_packages/Elasticsearch/` directory and run terraform init. This will initialize Terraform and download the required components.
443-
2. Run `terraform plan` to view the monitors that Terraform will create or modify.
444-
3. Run `terraform apply`.
342+
<AppInstall2 />
445343
446-
## Installing the Elasticsearch app
344+
As part of the app installation process, the following fields will be created by default:
345+
* `component`
346+
* `environment`
347+
* `db_system`
348+
* `db_cluster`
349+
* `pod`
350+
* `db_cluster_address`
351+
* `db_cluster_port`
447352
448-
import AppInstall from '../../reuse/apps/app-install.md';
353+
Additionally, if you're using Elasticsearch in the Kubernetes environment, the following additional fields will be created by default during the app installation process:
354+
* `pod_labels_component`
355+
* `pod_labels_environment`
356+
* `pod_labels_db_system`
357+
* `pod_labels_db_cluster`
358+
* `pod_labels_db_cluster_address`
359+
* `pod_labels_db_cluster_port`
449360
450-
<AppInstall/>
361+
For information on setting up fields, see [Fields](/docs/manage/fields).
451362
452363
## Viewing Elasticsearch dashboards
453364
454-
:::tip Filter with template variables
455-
Template variables provide dynamic dashboards that can rescope data on the fly. As you apply variables to troubleshoot through your dashboard, you view dynamic changes to the data for a quicker resolution to the root cause. You can use template variables to drill down and examine the data on a granular level. For more information, see [Filter with template variables](/docs/dashboards/filter-template-variables.md).
456-
:::
365+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
366+
367+
<ViewDashboards/>
457368
458369
### Overview
459370
@@ -533,9 +444,13 @@ The **ElasticSearch - Queries** dashboard shows Elasticsearch provides analytics
533444
534445
<img src={useBaseUrl('img/integrations/databases/elasticsearch-q.png')} alt="elasticsearch dashboards" />
535446
536-
## Elasticsearch Alerts
447+
## Create monitors for Elasticsearch app
448+
449+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
450+
451+
<CreateMonitors/>
537452
538-
Sumo Logic has provided out-of-the-box alerts available via[ Sumo Logic monitors](/docs/alerts/monitors) to help you quickly determine if the Elasticsearch database cluster is available and performing as expected.
453+
### Elasticsearch Alerts
539454
540455
| Alert Type (Metrics/Logs) | Alert Name | Alert Description | Trigger Type (Critical / Warning) | Alert Condition | Recover Condition |
541456
|---|---|---|---|---|---|

0 commit comments

Comments
 (0)