# Kubernetes Log Shipping
This demonstration has the purpose of presenting how you can easyly integrate EKS logs with Amazon Elasticsearch service and secure the access to the logs using Amazon Cognito.
## Architecture
**This demonstration was tested in us-east-1 region**
## Pre Reqs
- eksctl
- awscli
- kubectl
## Provision EKS cluster
We are going to use eksctl to provision our EKS cluster for this demonstration, eksctl will provision the Kubernetes master, nodes and **also the VPC**.
```shell
eksctl create cluster -f kubernetes-cluster-us-east-1.yaml
```
Now we have to configure our `~/.kube/config` file in order to access our cluster using kubectl.
```shell
aws eks --region us-east-1 update-kubeconfig --name kubelogs-cluster
```
This will update your kube config file, now let's test if we can access our cluster.
```shell
kubectl get nodes
```
## Fluent-bit IAM Role for Service Account
To use IAM roles for service accounts in your cluster, we will first create an OIDC identity provider.
```shell
eksctl utils associate-iam-oidc-provider \
--cluster kubelogs-cluster \
--approve
```
Next, we will create an IAM policy that limits the permissions needed by the Fluent Bit containers to connect to the Elasticsearch cluster. We will also create an IAM role for your Kubernetes service accounts to use before you associate it with a service account.
```shell
export ES_DOMAIN_NAME="es-eks-log-demo"
export ACCOUNT_ID="your aws account id"
export AWS_REGION="your aws region"
cat < ./fluent-bit-policy.json
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"es:ESHttp*"
],
"Resource": "arn:aws:es:${AWS_REGION}:${ACCOUNT_ID}:domain/${ES_DOMAIN_NAME}",
"Effect": "Allow"
}
]
}
EoF
aws iam create-policy \
--policy-name fluent-bit-policy \
--policy-document file://./fluent-bit-policy.json
```
Finally, create an IAM role for the fluent-bit Service Account in the logging namespace.
```shell
kubectl create namespace logging
eksctl create iamserviceaccount \
--name fluent-bit \
--namespace logging \
--cluster kubelogs-cluster \
--attach-policy-arn "arn:aws:iam::${ACCOUNT_ID}:policy/fluent-bit-policy" \
--approve \
--override-existing-serviceaccounts
```
Export the Fluent-bit role ARN.
```shell
export FLUENT_BIT_ROLE_ARN=$(kubectl get sa fluent-bit -nlogging -oyaml | grep -i 'arn:aws' | awk '{print $2}')
```
## Creating our Amazon Elasticsearch cluster with Cognito integration
In this repository you will find a CloudFormation template that will create all the components that we need to integrate Amazon Elasticsearch with Amazon Cognito.
```shell
aws cloudformation create-stack \
--stack-name kubelogs-es-stack \
--template-body file://cloudformation/stack.yaml \
--capabilities CAPABILITY_IAM \
--region us-east-1 \
--parameters ParameterKey=ArnFluentBit,ParameterValue=${FLUENT_BIT_ROLE_ARN}
```
## Create Fluent-bit DaemonSet on Amazon EKS
Let’s start by downloading the fluentbit.yaml deployment file and replace some variables.
```shell
export ES_ENDPOINT=$(aws es describe-elasticsearch-domain --domain-name ${ES_DOMAIN_NAME} --output text --query "DomainStatus.Endpoint")
curl -Ss https://www.eksworkshop.com/intermediate/230_logging/deploy.files/fluentbit.yaml \
| envsubst > ./fluentbit.yaml
```
Explore the file to see what will be deployed. The fluent bit log agent configuration is located in the Kubernetes ConfigMap and will be deployed as a DaemonSet, i.e. one pod per worker node. In our case, a 3 node cluster is used and so 3 pods will be shown in the output when we deploy.
```shell
kubectl apply -f ./fluentbit.yaml
```
Wait for all of the pods to change to running status.
```shell
kubectl --namespace=logging get pods
```
## Creating Cognito User to Access Kibana Dashboard
Access the AWS console and search for Cognito in services.
Click on Manage User Pools.
Access the UserPool `KibanaUsers`.
Select Users and groups and Create user.
Fill the requireds and click on `Create user`.
## Access Kibana Using Your Cognito User
Get the Kibana URL.
```shell
echo 'https://'$ES_ENDPOINT'/_plugin/kibana/'
```
The Cognito screen will show up, access it using your user created before.
Now let's create the Index Pattern that we will use for discover.
To create index patterns, complete the following steps:
- On the navigation panel, choose `Stack Managment` to open the Management page.
- Choose Index Patterns.
- Choose Create index pattern.
- For Index pattern, enter `fluent-*`.
- For Time filter, choose `@timestamp.`
- Choose Create index pattern.
Now you can Access the `Discover` dashboard and you should see your application logs.
## (Optional) Enable Cognito MFA
If you want to add MFA to your cognito User Pool, follow this [link](./auth_flow/README.md)
## References
https://docs.aws.amazon.com/elasticsearch-service/latest/developerguide/es-cognito-auth.html
https://github.com/aws-samples/amazon-elasticsearch-service-with-cognito/
## Security
See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.
## License
This library is licensed under the MIT-0 License. See the LICENSE file.