Skip to content

Centralized logging


Overview

A Centralized logging(CL) architecture collects and merges log information from numerous servers, applications, and services spanning across cloud platform, channeling it to a singular location to facilitate straightforward analysis and administration. It empowers infrastrucure and DevOps engineers to enhance their ability to identify, diagnose, and rectify issues with hightened efficiency, all while upholding security and compliance standards.
CL can retain the logs in a centralized place and can provide a retention of the logs as per the client's requirements.

Detailed Description

CL accumulates all type of logs in Azure Log Analytics Workspace (LAW) as shown in the high level diagram as below.

img

It facilitates the management of various log formats:

A type of diagnostic log in Azure that provide insights into the activities and events occurring within the Azure platform. They focus on capturing information related to the operation and health of Azure services and components rather than individual user or resource actions.
Log Category Details Regarding Source Destination
AAD Logs User sign-in activities and system activity information about users and group management. AAD Log Analytics Workspace
Resource Logs
1. Audit Logs
2. Firewall logs
Operations that were performed within an Azure resource (the data plane). Examples might be getting a secret from a key vault or making a request to a database. Azure Resources Event Hub to Log Analytics Workspace
Activity Logs (Role change logs) Operations on each Azure resource in the subscription from the outside (the management plane) and updates on Service Health events. There's a single activity log for each Azure subscription. Azure Resources Event Hub to Log Analytics Workspace
These logs contain valuable information about the activities and events occurring within the Virtual Machine, allowing administrators and developers to monitor and troubleshoot their VMs effectively. It can include System logs, Security logs, Application logs, Diagnostic logs, Azure monitor logs and Guest OS logs that are specific to VMs.
Details Regarding Source Destination
Syslogs and data about the operating system on compute resources. 1. Azure diagnostic extension
2. Log Analytics agent
3. VM insights
VM (host os)
NSG (Network Security Group) flow logs are a feature in Microsoft Azure that provides detailed visibility into network traffic flowing through Network Security Groups. NSGs act as virtual firewalls, allowing you to control inbound and outbound traffic to Azure resources such as virtual machines, subnets, and network interfaces.
Details Regarding Source Destination
IP traffic flowing through an NSG. NSG Storage Account
These are security-related logs generated by the Azure Defender service, which is a built-in security solution provided by Microsoft Azure. Azure Defender helps protect Azure resources by providing advanced threat protection, vulnerability management, and security alerts for various Azure services.
Log Category Details Regarding Source Destination
Processed Logs To Provides security information and alerts from Azure Defender and Monitor. Defender Alerts via Event Hub to Log Analytics Workspace
Third Party Logs (Open IAM, MongoDB) To provide insight into security logs of running instances. OpenIAM, MongoDB
Application logs in Azure refer to the logs generated by applications deployed in Azure services such as Azure Virtual Machines (VM) and Azure Kubernetes Service (AKS). These logs contain information about the application's behavior, events, errors, and other relevant details that help in monitoring, troubleshooting, and understanding application performance.
Log Category Details Regarding Source Destination
Application log
1. Ness logs
2. Regular App logs
Application security logs. Application Event Hub to Log Analytics Workspace
AppInsights (Performance, TLS/SSL Certificate logs) Application perfomance and proactive lifetime check of SSL Cert, from 1 day to 365 days. Application logs on AppInsights Log Analytics Workspace
  • Database Logs
These logs contain valuable information about the activities and events occurring within the databases, allowing administrators and developers to monitor and troubleshoot their databases effectively. Logs from various types of databases should be captured as and when necessary.

For more details, go to the detailed implementation document of each of the database logs:
- MSSQL
- MySQL

Details Regarding Source Destination
Audit Logs of various kinds of databases MSSQL,MySQL,PostgreSQL Log Analytics Workspace

Log types with respective LAW table names

Tables Log Type
AzureDiagnostics Diagnostics logs
Application logs
AzureActivity Activity logs
VM logs
SecurityEvent Defender logs
AAD logs
Netflow logs

Benefits and Business Case

In everyday business operations of any application, various challenges arise, including
  • Insufficient visibility
  • Restricted troubleshooting capacities
  • Compliance and security concerns

To address these concers and more, CL offers a variety of usage scenarios such as:

  • Security and Compliance
To provide application and infrastructure security information along with event logging. Each application has numerous separate integrations which makes the system vulnerable. CL enables the user to track all the actions and event in order to provide a more robust application.
  • Application Visibility
With the additional end-to-end responsibilities and increased accountability, the requirement for application issue troubleshooting has increased. The application log saves tremendous effort in debugging the issues and easy rectification.
  • Business Intelligence
It provides insights about system performance, user interaction and business performance. Faster, more adaptable insights across the application value chain helps the business in understanding the efficieny and reliability of the product.

Responsibilities

Initial Setup

  • Client has to submit the required information for the initial setup. Please fill the onboarding form and follow the section for more details.
Tier0 team will only be responsible for setting up all the logs except App Logs. For the configuration of App logs please visit the below links

Once the client setup and handover is complete the responsibilities are defined as below -

Tier0

  • The logs should be collected as expected.
  • Handle any setup or connectivity related issues.

Client

  • Setup of resources and services.