Skip to content

Commit ea34865

Browse files
authored
Housekeeping: Clean-up markdown files (#775)
1 parent 5d5d91b commit ea34865

File tree

9 files changed

+81
-195
lines changed

9 files changed

+81
-195
lines changed

CHANGELOG.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# SAS Viya Monitoring for Kubernetes
2+
## Unreleased
3+
* **Overall**
4+
* [REMOVAL] Removed the previously deprecated TLS sample. Deploying with TLS enabled has been the default since version
5+
1.2.15 (18JUL23).
6+
27

38
## Version 1.2.39 (20JUN2025)
49
* **Metrics**

logging/Azure_log_analytics_workspaces.md

Lines changed: 37 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -2,34 +2,32 @@
22

33
## Introduction
44

5-
If you use Microsoft Azure and want to use Azure Monitor *instead* of OpenSearch
6-
to explore, filter, and report on log messages from a SAS Viya environment, you
7-
can deploy the logging solution described in this document. This solution uses a
8-
combination of Fluent Bit and an Azure Log Analytics workspace to handle log
9-
messages so that they can be accessed by Azure Monitor. Please note that
10-
the development work in this solution has been limited, and is primarily a
11-
proof of concept.
12-
13-
**Note: Azure Monitor and Azure Log Analytics are optional features of
14-
Microsoft Azure, and they require agreement to additional licensing terms and
15-
additional charges. You must understand the terms and charges before you
5+
If you use Microsoft Azure and want to use Azure Monitor *instead* of OpenSearch
6+
to explore, filter, and report on log messages from a SAS Viya environment, you
7+
can deploy the alternate logging solution described in this document. This solution
8+
uses a combination of Fluent Bit and an Azure Log Analytics workspace to handle log
9+
messages so that they can be accessed by Azure Monitor. Please note that the
10+
development work in this solution has been limited, and is primarily a proof of
11+
concept.
12+
13+
**Note: Azure Monitor and Azure Log Analytics are optional features of
14+
Microsoft Azure, and they require agreement to additional licensing terms and
15+
additional charges. You must understand the terms and charges before you
1616
deploy the solution described in this document.**
1717

1818
## Technical Overview
1919

20-
In this solution, log messages are collected by the Fluent Bit
21-
pods that are part of the standard logging solution and that are deployed
22-
cluster-wide by using a Kubernetes DaemonSet. These Fluent Bit pods can
23-
parse and process log messages from all SAS Viya components, including
24-
third-party products. As a result, log messages are handled consistently,
25-
regardless of the original source.
20+
In this alternate solution, log messages are collected by the Fluent Bit
21+
pods that are part of the standard logging solution and that are deployed
22+
cluster-wide by using a Kubernetes DaemonSet. These Fluent Bit pods can
23+
parse and process log messages from all SAS Viya components, including
24+
third-party products. As a result, log messages are handled consistently,
25+
regardless of the original source.
2626

27-
In the standard solution, Fluent Bit sends the log messages to OpenSearch.
28-
In this solution, the log messages are loaded into a Log Analytics workspace
29-
as a "custom log" source. You can then use Azure Monitor to explore, filter, and
30-
report on the collected log messages. By default, this solution also includes
31-
the Event Router, with is a component that surfaces Kubernetes events as
32-
pseudo-log messages beside the log messages collected by Fluent Bit.
27+
In the standard solution, Fluent Bit sends the log messages to OpenSearch.
28+
In this solution, the log messages are loaded into a Log Analytics workspace
29+
as a "custom log" source. You can then use Azure Monitor to explore, filter, and
30+
report on the collected log messages.
3331

3432
## Deploy the Fluent Bit and Azure Log Analytics Solution
3533

@@ -74,37 +72,18 @@ This command returns two shared keys, labeled ***"primarySharedKey"*** and ***"s
7472
/logging/bin/deploy_logging_azmonitor.sh
7573
```
7674

77-
You can also deploy individual components:
78-
- Event Router
79-
```bash
80-
/logging/bin/deploy_eventroutersh
81-
```
82-
- Fluent Bit
83-
```bash
84-
/logging/bin/deploy_fluentbit_azmonitor.sh
85-
```
86-
8775
## Remove the Fluent Bit and Azure Log Analytics Solution
8876

8977
To remove all logging components for this solution, issue this command:
9078
```bash
9179
/logging/bin/remove_logging_azmonitor.sh
9280
```
93-
By default, this script does not delete the namespace, but it does delete configmaps and secrets that were created by the deployment script.
94-
95-
To remove individual components, issue these commands:
96-
- Event Router
97-
```bash
98-
/logging/bin/remove_eventroutersh
99-
```
100-
- Fluent Bit
101-
```bash
102-
/logging/bin/remove_fluentbit_azmonitor.sh
103-
```
81+
By default, this script does not delete the namespace, but it does delete configmaps and secrets that were created by the deployment script. If you would like to delete the namespace as well, set the environment variable `LOG_DELETE_NAMESPACE_ON_REMOVE` to
82+
*'true'* prior to running the script.
10483

10584
## Using Connection Information From a Kubernetes Secret
10685

107-
The deployment script creates a Kubernetes secret named `connection-info-azmonitor`containing the connection information.
86+
The deployment script creates a Kubernetes secret named `connection-info-azmonitor`containing the connection information.
10887
This ensures that the connection information is available in case the Fluent Bit pods are
10988
restarted or new nodes are added to the cluster. This secret is created
11089
in the same namespace into which the Fluent Bit pods are deployed. If this secret already exists
@@ -115,11 +94,11 @@ when you run the deployment script, the script obtains the connection informatio
11594
After deploying this solution, the collected log messages appear as
11695
a new table, **viya_logs_CL**, in the ***Custom Logs*** grouping within the
11796
specified Log Analytics workspace. The structure of this table is similar
118-
to the structure of the log messages that are surfaced in OpenSearch Dashboards when using the
97+
to the structure of the log messages that are surfaced in OpenSearch Dashboards when using the
11998
standard logging solution. However, due to features of the Azure
12099
API, the names of some fields are slightly different. The tables feature
121100
a flattened data model, so multi-level JSON fields appear as multiple
122-
fields with the JSON hierarchy embedded in each field's name. In addition, a
101+
fields with the JSON hierarchy embedded in each field's name. In addition, a
123102
suffix is added to the name of most of the fields to indicate the field's data type,
124103
such as ***_s*** for string fields and ***_d*** for a numeric (double) field.
125104

@@ -131,23 +110,23 @@ appear in the **viya_logs_CL** table as **kube_namespace_s** and **kube_pod_s**.
131110

132111
## Using the Data
133112

134-
Although a full explanation of how you can use the collected log messages in
135-
Azure Monitor and the Log Analytics workspace is out of scope for this document,
113+
Although a full explanation of how you can use the collected log messages in
114+
Azure Monitor and the Log Analytics workspace is out of scope for this document,
136115
here are some tips to help you get started.
137116

138117
### Kusto Queries
139118
Kusto is a powerful query language used by Log Analytics workspaces
140-
and Azure Monitor. To access an interactive Kusto query window in Azure Monitor,
141-
select your Log Analytics workspace in Azure Monitor, then select **Logs** from
142-
the **General** area of the toolbar on the left side of the window.
119+
and Azure Monitor. To access an interactive Kusto query window in Azure Monitor,
120+
select your Log Analytics workspace in Azure Monitor, then select **Logs** from
121+
the **General** area of the toolbar on the left side of the window.
143122

144123
![Azure Log Analytics Workspace - Kusto Query](../img/screenshot-kustoquery-chart.png)
145124

146125
The query window enables you perform these actions:
147126
- Enter Kusto queries.
148127
- Display query results as charts or graphs.
149128
- Export the query results.
150-
- Add query results to an Azure dashboard.
129+
- Add query results to an Azure dashboard.
151130

152131
You can also use Kusto queries as part of Azure Monitor workbooks.
153132

@@ -159,15 +138,15 @@ Here are some sample Kusto queries.
159138
This Kusto query returns all of the log messages collected in the past
160139
five minutes.
161140
```
162-
viya_logs_CL
141+
viya_logs_CL
163142
| where TimeGenerated > ago(5m)
164143
```
165144
If a query returns a large number of results, only the first
166145
10,000 results are shown. A message is displayed if the number of results is limited.
167146

168147
### Sample Query #2: Display Selected Fields
169-
This Kusto query also returns the log messages collected in the past five minutes, but it
170-
returns only specific fields. Limiting the information returned might make it easier
148+
This Kusto query also returns the log messages collected in the past five minutes, but it
149+
returns only specific fields. Limiting the information returned might make it easier
171150
to interpret the results.
172151
```
173152
viya_logs_CL
@@ -177,8 +156,8 @@ viya_logs_CL
177156
### Sample Query #3: Display Message Counts by Message Severity and Source
178157
The following query also returns the number of log messages generated over the last
179158
five minutes, but also summarizes the messages by message severity (**Level**) and source (**logsource_s**).
180-
The query returns the results in the form of a table. To view the results as
181-
a chart, click **Chart** item in the menu above the results output.
159+
The query returns the results in the form of a table. To view the results as
160+
a chart, click **Chart** item in the menu above the results output.
182161
```
183162
viya_logs_CL
184163
| where TimeGenerated > ago(5m)

logging/Differences_between_ODFE_and_OpenSearch.md

Lines changed: 0 additions & 101 deletions
This file was deleted.

logging/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ To learn how to deploy the logging component, see [Getting Started](https://docu
44

55
## Important Information about OpenSearch and OpenSearch Dashboards
66

7-
>As of release 1.2.0, this project uses OpenSearch and OpenSearch Dashboards.
8-
9-
**Notes:**
10-
11-
* OpenSearch replaces Elasticsearch.
12-
* OpenSearch Dashboards replaces Kibana.
13-
* Some configuration options, environment variables, and other aspects of this project might still include references to the prior product names. This is intentional. Doing so supports backward compatibility and continuity for users of this project. These references might change at a later date.
7+
This project uses OpenSearch and OpenSearch Dashboards and this has been
8+
true since version 1.2.0 released in June of 2022. Prior to that, the
9+
project used Elasticsearch and Kibana. To support backward compitibility,
10+
some configuration options, environment variables, and other aspects of
11+
this project still include references to those product names. References
12+
to Elasticsearch and Kibana should be understood to refer to OpenSearch
13+
and OpenSearch Dashboards respectively.

samples/README.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ each deployment file.
1818

1919
You customize your logging deployment by specifying values in `user.env` and
2020
`*.yaml` files. These files are stored in a local directory outside of your
21-
repository that is identified by the `USER_DIR` environment variable.
21+
repository that is identified by the `USER_DIR` environment variable.
2222
For information about the customization process, see [Create the Deployment Directory](https://documentation.sas.com/?cdcId=obsrvcdc&cdcVersion=v_003&docsetId=obsrvdply&docsetTarget=p15fe8611w9njkn1fucwbvlz8tyg.htm) in the SAS Viya Monitoring for Kubernetes Help Center.
2323

2424
The customization files in each sample provide a starting point for the
@@ -61,8 +61,7 @@ from SAS Viya components.
6161
* [ingress](ingress) - Deploys using host-based or path-based ingress.
6262
* [namespace-monitoring](namespace-monitoring) - Separates cluster monitoring
6363
from SAS Viya monitoring.
64-
* [tls](tls) - Enables TLS encryption for both in-cluster and ingress. Options
65-
for either host-based and path-based ingress are included.
64+
6665

6766
## Other Samples
6867

samples/generic-base/README.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ reference links and variable listings.
88

99
You customize your deployment by specifying values in `user.env` and `*.yaml`
1010
files. These files are stored in a local directory outside of your
11-
repository that is identified by the `USER_DIR` environment variable.
11+
repository that is identified by the `USER_DIR` environment variable.
1212
For information about the customization process, see [Create the Deployment Directory](https://documentation.sas.com/?cdcId=obsrvcdc&cdcVersion=v_003&docsetId=obsrvdply&docsetTarget=p15fe8611w9njkn1fucwbvlz8tyg.htm) in the SAS Viya Monitoring for Kubernetes Help Center.
1313

1414
The customization files in this sample provide a starting point for
@@ -25,7 +25,8 @@ your customization files after you add the values in this sample.
2525
After you finish modifying the customization files, deploy the metric-monitoring and
2626
log-monitoring components. See [Deploy](https://documentation.sas.com/?cdcId=obsrvcdc&cdcVersion=v_003&docsetId=obsrvdply&docsetTarget=n1rhzwx0mcnnnun17q11v85bspyk.htm) in the SAS Viya Monitoring for Kubernetes Help Center.
2727

28-
## Grafana Dashboards
28+
## Grafana Dashboards and Alerting
2929

30-
In addition to customizing the deployment, you can also use this sample to add
31-
your own Grafana dashboards. See [Add More Grafana Dashboards](https://documentation.sas.com/?cdcId=obsrvcdc&cdcVersion=v_003&docsetId=obsrvdply&docsetTarget=n1sg9bc44ow616n1sw7l3dlsbmgz.htm) for details.
30+
In addition to customizing the deployment, this sample show how you can add
31+
your own Grafana dashboards, alerts, contact points and notifications policies. See [Add More Grafana Dashboards](https://documentation.sas.com/?cdcId=obsrvcdc&cdcVersion=v_003&docsetId=obsrvdply&docsetTarget=n1sg9bc44ow616n1sw7l3dlsbmgz.htm), [Add More Grafana Alerts](***NEED***LINK***) and
32+
[Configure Contact Points, and Notification Policies](***NEED***LINK***) for details.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# User-Provided Alerts, Contact Points and Notification Policies
2+
3+
You can use the `$USER_DIR/monitoring/alerting` directory to supply
4+
a set of additional Grafana alerts to deploy with the monitoring
5+
components. You can also use the directory to define Grafana contact
6+
points and notification policies . See [Add More Grafana Alerts](***NEED***LINK***) and
7+
[Configure Contact Points, and Notification Policies](***NEED***LINK***) for details.

0 commit comments

Comments
 (0)