If several thousand S3 buckets are accessed by a bad actor in the forest, does anybody hear it?
Setting up logging is a core requirement for any company: logs can help engineering teams debug, security teams troubleshoot incidents and breaches, and is a widely accepted best practice.
However, oftentimes logging isn't configured for your existing resources. How can you enable logging en masse? If your environment is managed in Terraform, hitting cloud APIs is out of the question - you would cause drift. Wading into your jungle of ELBs, buckets, databases, and VMs without a good remediation framework in place can take years off of your life...
In this guide, we'll walk through how you can enable logging on your existing resources without causing Terraform drift. This way you can always have the logging you need, for the resources you expect, without causing yourself or your developer teams a huge headache.
Things you'll need to continue:
1. Resourcely account (sign up free)
2. A Terraform pipeline running, and the Resourcely Campaign Agent for scanning your Terraform state (use our demo scaffolding repo here)
Implementing logging for existing resources
Assigning Jira tickets and asking developers to figure out how to turn on logging on their own is often ineffective, slow, and unpopular.
With Resourcely Campaigns, you can manage this process end-to-end with a single person:
Add relevant Terraform through a guided IDE, without causing drift
Logging basics
Let's choose a set of resources we want to apply logging on. We'll assume an AWS environment in this case.
S3
ELBs
Redshift
Opensearch
RDS
Define your policies
First, we need to define our Terraform policies to cover all five of our resource type and the logging settings we desire. Let's write one step-by-step - start by navigating to the Foundry in Resourcely. Hover over each part of this Guardrail below to see what it does.
// Start by naming the Guardrail
Try typing this Guardrail into the Foundry. You will notice each resource, their properties, and the operators/clauses all have autofill
To enable logging on all of our resources, you can make one consolidated Guardrail:
GUARDRAIL "Require logging for S3"
WHEN aws_s3_bucket
REQUIRE logging EXISTS
REQUIRE logging.target_bucket EXISTS
REQUIRE logging.target_prefix = "aws-access-logs"
WHEN aws_elb
REQUIRE access_logs EXISTS
REQUIRE access_logs.bucket EXISTS
REQUIRE access_logs.enabled = true
REQUIRE access_logs.interval = 60
WHEN aws_redshift_cluster
REQUIRE logging EXISTS
REQUIRE logging.bucket_name EXISTS
REQUIRE logging.enable = true
WHEN aws_opensearch_domain
REQUIRE log_publishing_options EXISTS
WHEN aws_db_instance
REQUIRE monitoring_interval > 0
REQUIRE monitoring_role_arn EXISTS
REQUIRE enabled_cloudwatch_logs_exports = ["error", "general", "slowquery"]
OVERRIDE WITH APPROVAL @default
Publish this consolidated Guardrail after giving it metadata, and then you're ready to start scanning your existing state!
If you haven't set up the Campaign Agent yet, you need to in order to scan your existing Terraform state.
You could also do this for other clouds: here's the Guardrails for similar GCP resources:
Enforce GCP Logging
// All 4 resources covered by 1 Guardrail
GUARDRAIL "Require logging for Google storage buckets"
WHEN google_storage_bucket
REQUIRE logging EXISTS
REQUIRE logging.log_bucket EXISTS
REQUIRE logging.log_object_prefix = "gcs-access-logs"
WHEN google_compute_subnetwork
REQUIRE log_config EXISTS
REQUIRE log_config.aggregation_interval = "INTERVAL_5_SEC"
REQUIRE log_config.flow_sampling = 0.5
REQUIRE log_config.metadata = "INCLUDE_ALL_METADATA"
WHEN google_project_iam_audit_config
REQUIRE audit_log_config.log_type EXISTS
WHEN google_container_cluster
REQUIRE logging_service = "logging.googleapis.com/kubernetes"
OVERRIDE WITH APPROVAL @default
Scan your existing resources
Now we can identify which of your resources don't have logging! Here's the existing Terraform that I'm working with:
Our goal is to scan our Terraform and find where our logging policies are being violated.
Note: Resourcely actually scans your Terraform state, not just your Terraform code.
To start scanning, create a Resourcely Campaign. Give it a name, and choose the AWS logging Guardrail that we created.
After clicking "Create Campaign", we can inspect specific violations and see aggregated statistics. We found 9 policy violations across a variety of resources, from Redshift to S3 to load balancers to RDS instances.
You can scan multiple repos, and multiple Guardrails
Guided remediation
Now that we have identified resources that are missing logging, we can jump into remediation. Resourcely automatically identifies the IaC causing the violation. It presents this information in an IDE, giving developers guidance with support for exceptions or context updates.
Remediation screen
Resourcely's guided remediation screen is pictured below. It supports file navigation in your repository, feedback on code errors and warnings, and inline Guardrails that show the user exactly the policy they are violating.
Making remediation changes
Let's remediate some resources! We'll implement logging for some of these findings. Our RDS instance is violating this policy:
To make this change, we'll add a monitoring_interval, monitoring_role_arn, and enabled_cloudwatch_logs_exports.
Here, we have added missing configuration to our RDS instance. This is reflected with a pending orange hourglass icon on our Guardrail violation. We can repeat this for all of our policy violations, or we could request exceptions for some.
Request exceptions
If we don't believe that the policy applies in this case, we can request a policy exception for each resource by hitting "Request Exception".
Our exception request is registered as a green check mark. We'll review both types of changes (final and pending) when we submit our proposal as a change request.
Submitting a remediation proposal as a change request
We have two options when submitting our remediated Terraform: evaluating, or finalizing a change request.
Evaluate
Hitting Evaluate Changes will submit a draft change request, with accompanying Terraform and Resourcely checks. This does a couple things:
Verifies the user has written valid Terraform
Verifies the Terraform doesn't violate any Guardrails (either those that were previously violated, or new policies)
...without submitting this change request for review. Evaluation lets the user work independently to determine if the changes they make are accurate before involving others.
Finalize
Finalizing a change request will submit the PR for review. As with Evaluting, checks will run that verify the user is writing appropriate Terraform and not violating policies. Finalizing will tag in appropriate reviewers for approval using your existing version control, asking for review of both exceptions and any code changes.
Houston: we have logging
After finalizing our PR, we have added logging to our resources that desperately needed them. It is easy to make configuration changes at scale to cloud resources with Resourcely Campaigns - just define the behavior you want, and let us guide you through remediation.