NEW: cloudwatch modules for various resource monitoring

This commit is contained in:
KF 2022-10-25 14:21:37 +08:00
parent f43ef2bb3e
commit 4438ecbcd5
Signed by: xpk
GPG Key ID: CD4FF6793F09AB86
26 changed files with 564 additions and 0 deletions

View File

@ -0,0 +1,5 @@
# Monitoring module for BEA
This module deploys the default cloudwatch metric monitoring
## Notes
Terraform lifecycle ignores tags to speed up terraform subsequent update. Cloudwatch alarm tags cannot be read on aws console anyway.

View File

@ -0,0 +1,6 @@
#!/bin/bash
eval "$(jq -r '@sh "lb=\(.lb)"')"
RESULTS=$(aws elbv2 describe-target-groups --load-balancer-arn $lb --query TargetGroups[*].TargetGroupArn --output text --no-cli-pager | sed 's/\t/\n/g' | sort | xargs)
jq -n --arg result "$RESULTS" '{"result":$result}'

View File

@ -0,0 +1,31 @@
data external alb-targetgroups {
program = ["bash", "../../modules/ManagementGovernance/Monitoring.ALB/list-alb-targetgroups.sh"]
query = {
lb = var.load-balancer
}
}
resource aws_cloudwatch_metric_alarm alb-HealthyHostCount {
for_each = toset(split(" ", data.external.alb-targetgroups.result.result))
alarm_name = "ALBTG:HealthyHostCount:${split("/", each.value)[1]}/${split("/", each.value)[2]}"
comparison_operator = "LessThanThreshold"
evaluation_periods = "1"
metric_name = "HealthyHostCount"
period = "300"
statistic = "Minimum"
threshold = var.threshold-HealthHostCountMin
alarm_description = "ALBTG:HealthyHostCount"
namespace = "AWS/ApplicationELB"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-emergency]
ok_actions = [var.alarm-actions-emergency]
dimensions = {
TargetGroup = "targetgroup/${split("/", each.value)[1]}/${split("/", each.value)[2]}"
LoadBalancer = "app/${split("/",var.load-balancer)[2]}/${split("/",var.load-balancer)[3]}"
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = "~> 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 4.36.1"
}
}
}

View File

@ -0,0 +1,20 @@
# variable target-group {}
variable load-balancer {}
variable threshold-HealthHostCountMin {}
variable alarm-actions-urgent {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-urgent"
}
variable alarm-actions-emergency {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-emergency"
}
variable alarm-actions-standard {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-standard"
}
variable alarm-actions-general {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support"
}
variable default-tags {}

View File

@ -0,0 +1,5 @@
# Monitoring module for BEA
This module deploys the default cloudwatch metric monitoring
## Notes
Terraform lifecycle ignores tags to speed up terraform subsequent update. Cloudwatch alarm tags cannot be read on aws console anyway.

View File

@ -0,0 +1,69 @@
resource "aws_cloudwatch_metric_alarm" "ec2-StatusCheckFailed_System" {
alarm_name = "EC2:StatusCheckFailed_System:${var.ec2-instance-id}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "StatusCheckFailed_System"
period = "300"
statistic = "Maximum"
threshold = 0
alarm_description = "EC2:StatusCheckFailed_System"
namespace = "AWS/EC2"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-emergency]
ok_actions = [var.alarm-actions-emergency]
dimensions = {
InstanceId = var.ec2-instance-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource "aws_cloudwatch_metric_alarm" "ec2-StatusCheckFailed_Instance" {
alarm_name = "EC2:StatusCheckFailed_Instance:${var.ec2-instance-id}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "StatusCheckFailed_Instance"
period = "300"
statistic = "Maximum"
threshold = 0
alarm_description = "EC2:StatusCheckFailed_Instance"
namespace = "AWS/EC2"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-emergency]
ok_actions = [var.alarm-actions-emergency]
dimensions = {
InstanceId = var.ec2-instance-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource "aws_cloudwatch_metric_alarm" "ec2-CPUUtilization" {
alarm_name = "EC2:CPUUtilization:${var.ec2-instance-id}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "6"
metric_name = "CPUUtilization"
period = "300"
statistic = "Average"
threshold = var.threshold-CPUUtilization
alarm_description = "EC2:CPUUtilization"
namespace = "AWS/EC2"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
treat_missing_data = "notBreaching"
dimensions = {
InstanceId = var.ec2-instance-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = "~> 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 4.36.1"
}
}
}

View File

@ -0,0 +1,20 @@
variable ec2-instance-id {}
variable alarm-actions-urgent {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-urgent"
}
variable alarm-actions-emergency {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-emergency"
}
variable alarm-actions-standard {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-standard"
}
variable alarm-actions-general {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support"
}
variable default-tags {}
variable threshold-CPUUtilization {}

View File

@ -0,0 +1,5 @@
# Monitoring module for BEA
This module deploys the default cloudwatch metric monitoring
## Notes
Terraform lifecycle ignores tags to speed up terraform subsequent update. Cloudwatch alarm tags cannot be read on aws console anyway.

View File

@ -0,0 +1,45 @@
resource "aws_cloudwatch_metric_alarm" "emr-AppsPending" {
alarm_name = "EMR:AppsPending:${var.job-flow-id}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "AppsPending"
period = "1800"
statistic = "Average"
threshold = var.threshold-AppsPending
alarm_description = "EMR:AppsPending"
namespace = "AWS/ElasticMapReduce"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-standard]
ok_actions = [var.alarm-actions-standard]
dimensions = {
JobFlowId = var.job-flow-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource "aws_cloudwatch_metric_alarm" "emr-CapacityRemainingGB" {
alarm_name = "EMR:CapacityRemainingGB:${var.job-flow-id}"
comparison_operator = "LessThanThreshold"
evaluation_periods = "1"
metric_name = "CapacityRemainingGB"
period = "3600"
statistic = "Average"
threshold = var.threshold-CapacityRemainingGB
alarm_description = "EMR:CapacityRemainingGB"
namespace = "AWS/ElasticMapReduce"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
JobFlowId = var.job-flow-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = "~> 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 4.36.1"
}
}
}

View File

@ -0,0 +1,21 @@
variable job-flow-id {}
variable threshold-AppsPending {}
variable threshold-CapacityRemainingGB {}
variable alarm-actions-urgent {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-urgent"
}
variable alarm-actions-emergency {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-emergency"
}
variable alarm-actions-standard {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-standard"
}
variable alarm-actions-general {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support"
}
variable default-tags {}

View File

@ -0,0 +1,5 @@
# Monitoring module for BEA
This module deploys the default cloudwatch metric monitoring
## Notes
Terraform lifecycle ignores tags to speed up terraform subsequent update. Cloudwatch alarm tags cannot be read on aws console anyway.

View File

@ -0,0 +1,6 @@
#!/bin/bash
eval "$(jq -r '@sh "lb=\(.lb)"')"
RESULTS=$(aws elbv2 describe-target-groups --load-balancer-arn $lb --query TargetGroups[*].TargetGroupArn --output text --no-cli-pager | sed 's/\t/\n/g' | sort | xargs)
jq -n --arg result "$RESULTS" '{"result":$result}'

View File

@ -0,0 +1,31 @@
data external nlb-targetgroups {
program = ["bash", "../../modules/ManagementGovernance/Monitoring.NLB/list-nlb-targetgroups.sh"]
query = {
lb = var.load-balancer
}
}
resource aws_cloudwatch_metric_alarm nlb-HealthyHostCount {
for_each = toset(split(" ", data.external.nlb-targetgroups.result.result))
alarm_name = "NLBTG:HealthyHostCount:${split("/", each.value)[1]}/${split("/", each.value)[2]}"
comparison_operator = "LessThanThreshold"
evaluation_periods = "1"
metric_name = "HealthyHostCount"
period = "300"
statistic = "Minimum"
threshold = var.threshold-HealthHostCountMin
alarm_description = "NLBTG:HealthyHostCount"
namespace = "AWS/NetworkELB"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-emergency]
ok_actions = [var.alarm-actions-emergency]
dimensions = {
TargetGroup = "targetgroup/${split("/", each.value)[1]}/${split("/", each.value)[2]}"
LoadBalancer = "net/${split("/",var.load-balancer)[2]}/${split("/",var.load-balancer)[3]}"
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = "~> 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 4.36.1"
}
}
}

View File

@ -0,0 +1,20 @@
# variable target-group {}
variable load-balancer {}
variable threshold-HealthHostCountMin {}
variable alarm-actions-urgent {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-urgent"
}
variable alarm-actions-emergency {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-emergency"
}
variable alarm-actions-standard {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-standard"
}
variable alarm-actions-general {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support"
}
variable default-tags {}

View File

@ -0,0 +1,5 @@
# Monitoring module for BEA
This module deploys the default cloudwatch metric monitoring
## Notes
Terraform lifecycle ignores tags to speed up terraform subsequent update. Cloudwatch alarm tags cannot be read on aws console anyway.

View File

@ -0,0 +1,91 @@
resource aws_cloudwatch_metric_alarm rds-cpu {
alarm_name = "RDS:CpuUtilization:${var.rds-instance-name}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "CPUUtilization"
period = "3600"
statistic = "Average"
threshold = var.threshold-CpuUtilization
alarm_description = "RDS:CpuUtilization"
namespace = "AWS/RDS"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
DBInstanceIdentifier = var.rds-instance-name
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource aws_cloudwatch_metric_alarm rds-storage {
alarm_name = "RDS:FreeStorageSpace:${var.rds-instance-name}"
comparison_operator = "LessThanThreshold"
evaluation_periods = "1"
metric_name = "FreeStorageSpace"
period = "3600"
statistic = "Average"
threshold = var.threshold-FreeStorageSpace
alarm_description = "RDS:FreeStorageSpace"
namespace = "AWS/RDS"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
DBInstanceIdentifier = var.rds-instance-name
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource aws_cloudwatch_metric_alarm rds-memory {
alarm_name = "RDS:FreeableMemory:${var.rds-instance-name}"
comparison_operator = "LessThanThreshold"
evaluation_periods = "1"
metric_name = "FreeableMemory"
period = "3600"
statistic = "Average"
threshold = var.threshold-FreeableMemory
alarm_description = "RDS:FreeableMemory"
namespace = "AWS/RDS"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
DBInstanceIdentifier = var.rds-instance-name
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource aws_cloudwatch_metric_alarm rds-DiskQueueDepth {
alarm_name = "RDS:DiskQueueDepth:${var.rds-instance-name}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "DiskQueueDepth"
period = "300"
statistic = "Average"
threshold = var.threshold-DiskQueueDepth
alarm_description = "RDS:DiskQueueDepth"
namespace = "AWS/RDS"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
DBInstanceIdentifier = var.rds-instance-name
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = "~> 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 4.36.1"
}
}
}

View File

@ -0,0 +1,23 @@
variable rds-instance-name {}
variable alarm-actions-urgent {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-urgent"
}
variable alarm-actions-emergency {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-emergency"
}
variable alarm-actions-standard {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-standard"
}
variable alarm-actions-general {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support"
}
variable default-tags {}
variable threshold-FreeableMemory {}
variable threshold-CpuUtilization {}
variable threshold-FreeStorageSpace {}
variable threshold-DiskQueueDepth {}

View File

@ -0,0 +1,5 @@
# Monitoring module for BEA
This module deploys the default cloudwatch metric monitoring
## Notes
Terraform lifecycle ignores tags to speed up terraform subsequent update. Cloudwatch alarm tags cannot be read on aws console anyway.

View File

@ -0,0 +1,75 @@
resource aws_cloudwatch_metric_alarm redis-EngineCPUUtilization {
alarm_name = "Redis:EngineCPUUtilization:${var.redis-cluster-id}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "EngineCPUUtilization"
period = "3600"
statistic = "Average"
threshold = var.threshold-EngineCPUUtilization
alarm_description = "Redis:EngineCPUUtilization"
namespace = "AWS/ElastiCache"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
CacheClusterId = var.redis-cluster-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
resource aws_cloudwatch_metric_alarm redis-DatabaseMemoryUsagePercentage {
alarm_name = "Redis:DatabaseMemoryUsagePercentage:${var.redis-cluster-id}"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = "1"
metric_name = "DatabaseMemoryUsagePercentage"
period = "3600"
statistic = "Average"
threshold = var.threshold-DatabaseMemoryUsagePercentage
alarm_description = "Redis:DatabaseMemoryUsagePercentage"
namespace = "AWS/ElastiCache"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-urgent]
ok_actions = [var.alarm-actions-urgent]
dimensions = {
CacheClusterId = var.redis-cluster-id
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}
/*
data aws_elasticache_cluster redis-cluster {
cluster_id = var.redis-cluster-id
}
*/
resource aws_cloudwatch_metric_alarm redis-CacheHitRate {
# for_each = toset(data.aws_elasticache_cluster.redis-cluster.cache_nodes.*.id)
alarm_name = "Redis:CacheHitRate:${var.redis-cluster-id}"
comparison_operator = "LessThanThreshold"
evaluation_periods = "1"
metric_name = "CacheHitRate"
period = "1800"
statistic = "Average"
threshold = var.threshold-CacheHitRate
alarm_description = "Redis:CacheHitRate"
namespace = "AWS/ElastiCache"
insufficient_data_actions = []
actions_enabled = "true"
alarm_actions = [var.alarm-actions-standard]
ok_actions = [var.alarm-actions-standard]
dimensions = {
CacheClusterId = var.redis-cluster-id
# CacheNodeId = each.value
}
tags = var.default-tags
lifecycle {
ignore_changes = [tags]
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = "~> 1.3.0"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 4.36.1"
}
}
}

View File

@ -0,0 +1,22 @@
variable redis-cluster-id {}
variable alarm-actions-urgent {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-urgent"
}
variable alarm-actions-emergency {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-emergency"
}
variable alarm-actions-standard {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support-standard"
}
variable alarm-actions-general {
type = string
default = "arn:aws:sns:ap-east-1:843733946244:rackspace-support"
}
variable default-tags {}
variable threshold-EngineCPUUtilization {}
variable threshold-DatabaseMemoryUsagePercentage {}
variable threshold-CacheHitRate {}