LogStash parsing rules for some CloudFoundry-specific log formats:
- App logs
- Container metrics
- UAA logs
This documentation assumes that you have a working LogSearch deployment and that bosh_cli is pointed at the right director.
$ bosh download manifest $logsearch_deployment_name > ~/workspace/logsearch.yml$ bosh create release
$ bosh upload releaseAt this point there is a choice to make. If Kibana is publicly exposed in your deployment and you wish to protect it with authentication, you have 2 options.
You can configure the haproxy job in logsearch-boshrelease to act as an authentication proxy in front of Kibana. Configuration for the haproxy job looks like this:
properties:
haproxy:
kibana:
auth:
user: user
password: passwordthen:
$ vim templates/logsearch-for-cf.example.yml
$ scripts/generate_deployment_manifest ~/workspace/logsearch.yml templates/logsearch-for-cf.example.yml > ~/workspace/logsearch-with-logsearch-for-cf.ymlWARNING There are currently a set of known issues with the Kibana UAA auth. See #94 for details
Alternatively, you can use the kibana plugin provided by this release to get kibana to ask the user for credentials and perform an OAuth handshake with the CloudFoundry UAA server before serving requests.
$ vim templates/logsearch-for-cf.example-with-uaa-auth.yml
$ scripts/generate_deployment_manifest ~/workspace/logsearch.yml templates/t/logsearch-for-cf.example-with-uaa-auth.yml > ~/workspace/logsearch-with-logsearch-for-cf.yml$ bosh deployment ~/workspace/logsearch-with-logsearch-for-cf.yml
$ bosh deploy$ bosh run errand create-uaa-client