Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Secure Multi-Cloud Logging — End-to-end encrypted logging pipeline across AWS and Azure using Terraform Cloud, Ansible, and Dockerized ELK stack (rsyslog → Logstash → Elasticsearch → Kibana) with TLS transport.

License

NotificationsYou must be signed in to change notification settings

nazmulapu/secure-multicloud-logging

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Short, reproducible demo of a centralized logging pipeline that ships logs from Azure into an ELK stack running on AWS. Terraform builds the cloud plumbing, Ansible configures the hosts, and a couple of helper scripts keep inventory and tests in sync.

Architecture in Brief

  • AWS collector: Ubuntu EC2 instance with Docker-based Elasticsearch, Logstash, Kibana, and a TLS-enabled rsyslog server.
  • Azure generator: Ubuntu VM that forwards logs over TLS (6514) and runs a simple log generator.
  • Secure transport: Only TLS-encrypted syslog traffic traverses clouds; SSH/Kibana access is locked down to caller-controlled CIDRs.

Repository Layout

  • terraform/aws,terraform/azure – IaC for the collector and generator.
  • ansible/ – Playbooks and roles for Docker ELK, rsyslog, and common host setup.
  • scripts/ – Convenience helpers (one-shot deploy, inventory sync, smoke tests, cleanup).
  • docs/ – Optional deep dives if you want more context.

Requirements

  • Terraform ≥ 1.5, Ansible ≥ 2.14
  • AWS CLI + credentials with EC2/VPC access
  • Azure CLI + subscription with VM/VNet access
  • An SSH key pair you can upload to both clouds

Quick Start

  1. Clone the repo and reviewterraform.tfvars.example in bothterraform/aws andterraform/azure.
  2. Store the real variable values in Terraform Cloud workspaces (secure-multicloud-logging,azure-log-generator) or localterraform.tfvars.
  3. Runbash scripts/deploy-all.sh to provision AWS + Azure and configure both hosts.
  4. Visithttp://<collector-ip>:5601, create thesyslog-* index pattern, and watch logs arrive.

Need to rerun Ansible later? Usescripts/sync-terraform-outputs.sh after any Terraform apply to refresh inventory, then call the playbooks directly.

Cleanup

Destroy each stack when you finish:

(cd terraform/azure&& terraform destroy)(cd terraform/aws&& terraform destroy)

More Detail

  • Deployment checklists:docs/aws-setup.md,docs/azure-setup.md
  • Architecture notes:docs/architecture.md
  • Troubleshooting tips:docs/troubleshooting.md

About

Secure Multi-Cloud Logging — End-to-end encrypted logging pipeline across AWS and Azure using Terraform Cloud, Ansible, and Dockerized ELK stack (rsyslog → Logstash → Elasticsearch → Kibana) with TLS transport.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp