All Projects → neogenix → k8s-elk

neogenix / k8s-elk

Licence: other
Kubernetes ELK - ElasticSearch, Kibana, Logstash, and all the trimmings

Projects that are alternatives of or similar to k8s-elk

ELK-Hunting
Threat Hunting with ELK Workshop (InfoSecWorld 2017)
Stars: ✭ 58 (+56.76%)
Mutual labels:  kibana, logstash, elk-stack
elk-stack
ELK Stack (Elasticsearch, Logstash & Kibana)
Stars: ✭ 13 (-64.86%)
Mutual labels:  kibana, logstash, elk-stack
eslog tutorial
From Raw Logs to Real Insights - A tutorial for getting started with log analytics using Elastic Stack.
Stars: ✭ 28 (-24.32%)
Mutual labels:  kibana, logstash, elk-stack
microservice-elk
Creating microservice using Spring Boot, Eureka, Zuul, Sleuth, Zipkin and ELK Stack
Stars: ✭ 19 (-48.65%)
Mutual labels:  kibana, logstash, elk-stack
Elk Hole
elasticsearch, logstash and kibana configuration for pi-hole visualiziation
Stars: ✭ 136 (+267.57%)
Mutual labels:  kibana, logstash, elk-stack
tutorials
Tutorials
Stars: ✭ 80 (+116.22%)
Mutual labels:  kibana, logstash, elk-stack
skalogs-bundle
Open Source data and event driven real time Monitoring and Analytics Platform
Stars: ✭ 16 (-56.76%)
Mutual labels:  kibana, logstash, elk-stack
Helk
The Hunting ELK
Stars: ✭ 3,097 (+8270.27%)
Mutual labels:  kibana, logstash, elk-stack
Elastic
Elastic Stack (6.2.4) 을 활용한 Dashboard 만들기 Project
Stars: ✭ 121 (+227.03%)
Mutual labels:  kibana, logstash, elk-stack
Json Logging Python
Python logging library to emit JSON log that can be easily indexed and searchable by logging infrastructure such as ELK, EFK, AWS Cloudwatch, GCP Stackdriver
Stars: ✭ 143 (+286.49%)
Mutual labels:  kibana, logstash, elk-stack
spring-boot-elk
An sample todo app demonstrating centralised logging using ELK stack
Stars: ✭ 20 (-45.95%)
Mutual labels:  kibana, logstash, elk-stack
awesome-elastic-stack
Awesome Elastic Stack
Stars: ✭ 29 (-21.62%)
Mutual labels:  kibana, logstash
logrus-redis-hook
Hook for Logrus which enables logging to RELK stack (Redis, Elasticsearch, Logstash and Kibana)
Stars: ✭ 33 (-10.81%)
Mutual labels:  kibana, logstash
docker elk stack
Docker images to run an ELK stack
Stars: ✭ 24 (-35.14%)
Mutual labels:  kibana, logstash
data-processing-with-logstash
Contains the configuration files used within the Data Processing with Logstash course.
Stars: ✭ 76 (+105.41%)
Mutual labels:  logstash, elk-stack
logstash filter f5
A Logstash filter for F5 apd, dcc, sshd and tmm syslog.
Stars: ✭ 19 (-48.65%)
Mutual labels:  kibana, logstash
frontreport
Simple frontend logging collector written in Go
Stars: ✭ 23 (-37.84%)
Mutual labels:  kibana, logstash
S1EM
This project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+629.73%)
Mutual labels:  kibana, logstash
docker-elk-stack
The ELK stack Docker containerization (Elasticsearch, Logstash and Kibana)
Stars: ✭ 20 (-45.95%)
Mutual labels:  kibana, logstash
elk-dashboard-v5-docker
My production setup for the latest version of ELK stack running in a compose, displaying a basic -but powerfull- security and performance dashboard.
Stars: ✭ 25 (-32.43%)
Mutual labels:  kibana, logstash

Kubernetes ELK - ElasticSearch, Kibana, Logstash, and all the trimmings

This repository currently includes the ElasticSearch, and Kibana configurations. ElasticSearch is run in 3 forms. The first is the "master" type, which is the master type from the ElasticSearch documentation. The second type is the "ingest" type, which is the ingest type from the ElasticSearch documentation. The ingest nodes include a horizonalPodAutoscaler based on CPU usage, and these nodes are connected to an internal service for Kibana, as well as an external service for HTTP input from outside.

The third type is the "data" node. These are constructed using the statefulSet, and PersistentVolumeClaims which will scale accordingly. You can only scale ordinally (+1, -1, to the most recent pod), and all general ElasticSearch rules apply (if you remove more nodes than you can withstand failures between allowing the cluster to rebalanace itself, you'll be in trouble).

I've used a "headless" service construct to mimic the function of service discovery, and have placed the "master" ElasticSearch nodes into the service to be used with zen.discovery inside ElasticSearch.

The remaining container configuration is for Kibana at the moment. These simply specify where ElasticSearch is. I've worked hard to use the plain vanilla upstream containers from Elastic.co, so you shouldn't have to import any custom containers from me :)

The repo will include (in the near future) entrypoints for logs via logstash, and all the logstash parts, but for the time being those are being reworked elsewhere.

To use these, simply pull the repo down, make a cluster in GKE, and run the following:

kubectl create -f configmap-production.yml,es-master,es-ingest,es-data,service-es.yml,kibana,service-kibana.yml

To delete what you've created, run the following:

kubectl delete configmap,service,statefulset,deployment,pvc,hpa -l application=logging

The things I still intend to add to the repo:

  • Configure Curator
  • Disable the x-pack monitoring through an environment variable
  • Better distribution configurations to make sure we don't have too many eggs in one basket
  • Better handling of deletes for the statefulSets
  • Better handling of security between pods (kibana and logstash shouldn't be able to talk to data-nodes for example)
  • Better examples for handling firewall rules in GKE
  • Better examples for handling scale up, and scale down
  • Better HTTP(s) ?
  • Better handling of security (external vs. internal, firewall rules)
  • Add Diagram
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].