Skip to content

Commit 70c799c

Browse files
authored
feat(aws): AWSX-1598 Move source identification to logs-backend (#963)
* feat(aws): AWSX-1598 Move source identification to logs-backend Signed-off-by: Vincent Boutour <[email protected]> * fixup! feat(aws): AWSX-1598 Move source identification to logs-backend Signed-off-by: Vincent Boutour <[email protected]> --------- Signed-off-by: Vincent Boutour <[email protected]>
1 parent ebacd32 commit 70c799c

File tree

3 files changed

+0
-51
lines changed

3 files changed

+0
-51
lines changed

aws/logs_monitoring/steps/enums.py

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3,27 +3,21 @@
33

44
class AwsEventSource(Enum):
55
AWS = "aws"
6-
CARBONBLACK = "carbonblack"
7-
CLOUDFRONT = "cloudfront"
86
CLOUDTRAIL = "cloudtrail"
97
CLOUDWATCH = "cloudwatch"
108
ELASTICSEARCH = "elasticsearch"
11-
ELB = "elb"
129
FARGATE = "fargate"
1310
GUARDDUTY = "guardduty"
1411
KINESIS = "kinesis"
1512
LAMBDA = "lambda"
1613
MARIADB = "mariadb"
1714
MSK = "msk"
1815
MYSQL = "mysql"
19-
NETWORKFIREWALL = "network-firewall"
2016
POSTGRESQL = "postgresql"
2117
ROUTE53 = "route53"
2218
S3 = "s3"
2319
SNS = "sns"
2420
STEPFUNCTION = "stepfunction"
25-
VERIFIED_ACCESS = "verified-access"
26-
VPC = "vpc"
2721
WAF = "waf"
2822

2923
def __str__(self):
@@ -32,15 +26,11 @@ def __str__(self):
3226
@staticmethod
3327
def cloudwatch_sources():
3428
return [
35-
AwsEventSource.CLOUDFRONT,
3629
AwsEventSource.CLOUDTRAIL,
3730
AwsEventSource.ELASTICSEARCH,
3831
AwsEventSource.FARGATE,
3932
AwsEventSource.MSK,
40-
AwsEventSource.NETWORKFIREWALL,
4133
AwsEventSource.ROUTE53,
42-
AwsEventSource.VERIFIED_ACCESS,
43-
AwsEventSource.VPC,
4434
]
4535

4636

@@ -53,19 +43,11 @@ def __init__(self, string, event_source):
5343
WAF_0 = ("aws-waf-logs", AwsEventSource.WAF)
5444
WAF_1 = ("waflogs", AwsEventSource.WAF)
5545

56-
# e.g. carbon-black-cloud-forwarder/alerts/org_key=*****/year=2021/month=7/day=19/hour=18/minute=15/second=41/8436e850-7e78-40e4-b3cd-6ebbc854d0a2.jsonl.gz
57-
CARBONBLACK = ("carbon-black", AwsEventSource.CARBONBLACK)
58-
# e.g. AWSLogs/123456779121/elasticloadbalancing/us-east-1/2020/10/02/123456779121_elasticloadbalancing_us-east-1_app.alb.xxxxx.xx.xxx.xxx_x.log.gz
59-
ELB = ("elasticloadbalancing", AwsEventSource.ELB)
6046
GUARDDUTY = ("guardduty", AwsEventSource.GUARDDUTY)
6147
KINESIS = ("amazon_kinesis", AwsEventSource.KINESIS)
6248
MSK = ("amazon_msk", AwsEventSource.MSK)
63-
NETWORKFIREWALL = ("network-firewall", AwsEventSource.NETWORKFIREWALL)
6449
# e.g. AWSLogs/123456779121/vpcdnsquerylogs/vpc-********/2021/05/11/vpc-********_vpcdnsquerylogs_********_20210511T0910Z_71584702.log.gz
6550
ROUTE53 = ("vpcdnsquerylogs", AwsEventSource.ROUTE53)
66-
VERIFIED_ACCESS = ("verified-access", AwsEventSource.VERIFIED_ACCESS)
67-
# e.g. AWSLogs/123456779121/vpcflowlogs/us-east-1/2020/10/02/123456779121_vpcflowlogs_us-east-1_fl-xxxxx.log.gz
68-
VPC = ("vpcflowlogs", AwsEventSource.VPC)
6951

7052
def __str__(self):
7153
return f"{self.string}"

aws/logs_monitoring/steps/handlers/awslogs_handler.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,8 +128,6 @@ def set_host(self, metadata, aws_attributes):
128128
match metadata_source:
129129
case AwsEventSource.CLOUDWATCH:
130130
metadata[DD_HOST] = log_group
131-
case AwsEventSource.VERIFIED_ACCESS:
132-
self.handle_verified_access_source(metadata, aws_attributes)
133131
case AwsEventSource.STEPFUNCTION:
134132
self.handle_step_function_source(metadata, aws_attributes)
135133

aws/logs_monitoring/tests/test_parsing.py

Lines changed: 0 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -98,28 +98,6 @@ def test_kinesis_event(self):
9898
str(AwsEventSource.KINESIS),
9999
)
100100

101-
def test_vpc_event(self):
102-
self.assertEqual(
103-
parse_event_source({"awslogs": "logs"}, "abc123_my_vpc_loggroup"),
104-
str(AwsEventSource.VPC),
105-
)
106-
self.assertEqual(
107-
parse_event_source(
108-
{"Records": ["logs-from-s3"]},
109-
"AWSLogs/123456779121/vpcflowlogs/us-east-1/2020/10/02/123456779121_vpcflowlogs_us-east-1_fl-xxxxx.log.gz",
110-
),
111-
str(AwsEventSource.VPC),
112-
)
113-
114-
def test_elb_event(self):
115-
self.assertEqual(
116-
parse_event_source(
117-
{"Records": ["logs-from-s3"]},
118-
"AWSLogs/123456779121/elasticloadbalancing/us-east-1/2020/10/02/123456779121_elasticloadbalancing_us-east-1_app.alb.xxxxx.xx.xxx.xxx_x.log.gz",
119-
),
120-
str(AwsEventSource.ELB),
121-
)
122-
123101
def test_waf_event(self):
124102
self.assertEqual(
125103
parse_event_source(
@@ -214,15 +192,6 @@ def test_msk_event(self):
214192
str(AwsEventSource.MSK),
215193
)
216194

217-
def test_carbon_black_event(self):
218-
self.assertEqual(
219-
parse_event_source(
220-
{"Records": ["logs-from-s3"]},
221-
"carbon-black-cloud-forwarder/alerts/8436e850-7e78-40e4-b3cd-6ebbc854d0a2.jsonl.gz",
222-
),
223-
str(AwsEventSource.CARBONBLACK),
224-
)
225-
226195
def test_cloudwatch_source_if_none_found(self):
227196
self.assertEqual(
228197
parse_event_source({"awslogs": "logs"}, ""), str(AwsEventSource.CLOUDWATCH)

0 commit comments

Comments
 (0)