Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RFCnnnn - HTTP POSTing ScriptBlock Logging Provider #106

Closed
wants to merge 1 commit into from

Conversation

rhysjtevans
Copy link

No description provided.

@msftclas
Copy link

msftclas commented Oct 24, 2017

CLA assistant check
All CLA requirements met.

@rhysjtevans rhysjtevans changed the title added new RFC titled 'HTTP POSTing ScriptBlock Logging Provider' RFCnnnn - 'HTTP POSTing ScriptBlock Logging Provider' Oct 24, 2017
@rhysjtevans rhysjtevans changed the title RFCnnnn - 'HTTP POSTing ScriptBlock Logging Provider' RFCnnnn - HTTP POSTing ScriptBlock Logging Provider Oct 24, 2017
@mi-hol
Copy link

mi-hol commented Apr 29, 2018

@SteveL-MSFT this RFC seems to miss labels in order to be considered for review

@rhysjtevans
Copy link
Author

@SteveL-MSFT Is that something for myself to action?

@SteveL-MSFT
Copy link
Member

cc @dantraMSFT this may be of interest to you

@rhysjtevans
Copy link
Author

Any progress on this?

@iSazonov
Copy link
Contributor

This is useful, but it makes no sense to do this in PowerShell repository - it is too expensive. I'd look that .Net Core suggest for remote logging.

@SteveL-MSFT
Copy link
Member

@TravisEz13 @PaulHigin please take a look at this to see if it aligns with some discussions we've had to enable logging to Azure Log Analytics

##### Configuration
The plan would be to import the configuration data with the following example properties with example values;
1. StreamLogType
* TCP, UDP, HTTP, HTTPS
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How would TCP, UDP, and HTTP data be encrypted? If we don't have an plan to encrypt, the options should not be included.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps move these to alternatives with notes that we need to figure out how to secure the channels.

@joeyaiello
Copy link
Contributor

@PowerShell/powershell-committee discussed this one in detail today. We believe that there's massive value in figuring out how to tee logs off to remote logging providers, but a bunch of the semantics in this RFC are specific to Splunk.

Instead, we think an RFC should be authored that builds a provider/plugin model for allowing multiple remote logging providers. This RFC should also give consideration to whether local logging targets should be treated the same way (e.g. if you want to exclusively log to a remote target, maybe in serverless/stateless scenarios). There should also be a consideration of whether we should have something like a Get-PSLog or Write-PSLog that are agnostic to logging providers.

The PowerShell Team has a strong interest in picking this up, but we have no idea when we can get to it right now. We only know that it should be a flexible, pluggable model.

For this particular RFC, we're rejecting it and filing an issue to track the need for the new RFC.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants