You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to meet the monitoring and alerting needs for data.gov applications running in cloud.gov, the data.gov team wants to monitor logs and telemetry from cloud.gov apps and alert when suspicious conditions arise.
Acceptance Criteria
[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]
WHEN an application in a space in the gsa-datagov organization on cloud.gov logs a "test" error
THEN the data.gov team is alerted that the test was logged.
[something about the specific kings of monitoring and alerting we want to do goes here; should it be a separate issue to configure specific alerts for each app??]
mogul
changed the title
Configure alerting and monitoring via a brokered AWS Elasticsearch
Configure monitoring and alerting for cloud.gov apps
Mar 15, 2021
mogul
changed the title
Configure monitoring and alerting for cloud.gov apps
Configure monitoring and alerting for cloud.gov app logs
Mar 15, 2021
mogul
changed the title
Configure monitoring and alerting for cloud.gov app logs
Configure monitoring and alerting for cloud.gov app logs and metrics
Mar 15, 2021
User Story
In order to meet the monitoring and alerting needs for data.gov applications running in cloud.gov, the data.gov team wants to monitor logs and telemetry from cloud.gov apps and alert when suspicious conditions arise.
Acceptance Criteria
[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]
gsa-datagov
organization on cloud.gov logs a "test" errorTHEN the data.gov team is alerted that the test was logged.
Background
Security Considerations (required)
Relates to section SI-4(5) of our SSP.
Sketch
The Loki+Grafana path:
The AWS ES path:
The text was updated successfully, but these errors were encountered: