Linux | Windows | |
---|---|---|
Build Status | ||
Build History |
Because unmonitored infrastructure will bite you
AWSWatchman creates and maintains AWS CloudWatch alerts.
Dynamic monitoring. This program creates and maintains CloudWatch alerts for infrastructure in AWS. It covers DynamoDB tables and SQS queues and more.
The details of who to alert and what tables to alert on must be stored in config files.
NB: be careful This code, when used correctly, will modify your AWS account by adding CloudWatch alerts to multiple resources. By default it will do a dry run which will tell you what alarms would be added. You must add --RunMode GenerateAlarms
to enable writes.
Unmonitored infrastructure is a problem waiting to happen, so all infrastructure in AWS should have appropriate alerts via CloudWatch. It is usually possible to declare all these alarms with the resource upfront in CloudFormation. But this is not always the best way to do it. AWSWatchman is good for cases where the CloudFormation definitions are harder to use, e.g.
- Dynamically scaled resources such as DynamoDb tables where the table can be scaled up
- Dynamically created resources such as SQS queues, where the queue can be subscribed to a topic at runtime by code.
- Verifying existing resources by scanning all resources in the system and programmatically identifying ones that do not have alarms, rather than inspecting all the CloudFormation text that created them.
Watchman
is written in C# and .NET Core version 2. You can download the dotnet
runtime for Windows, mac or linux here
Run the Watchman
specifying a config folder for config files (see Configuration file format) and optionally aws credentials.
e.g.
With AWS credentials on the command line.
dotnet .\Watchman.dll --RunMode GenerateAlarms --ConfigFolder ".\Configs" --AwsAccessKey AKABC123 --AwsSecretKey abcd1234
With AWS credentials from a profile.
dotnet .\Watchman.dll --RunMode GenerateAlarms --ConfigFolder ".\Configs" --AwsProfile prod
With default AWS credentials.
dotnet .\Watchman.dll --RunMode GenerateAlarms --ConfigFolder ".\Configs"
If you are using the new resource types and have a high number of alarms you will need to specify and s3 bucket/path that the cloudformation template can be deployed to. The AWS credentials will need permissions to put objects into that location.
dotnet .\Watchman.dll --RunMode GenerateAlarms --ConfigFolder ".\Configs --TemplateS3Path s3://je-deployments-qa21/watchman"
The allowed commandline parameters are:
RunMode
: One ofTestConfig
,DryRun
, orGenerateAlarms
. Optional, default isDryRun
. Mode behaviours are:TestConfig
: Configs are loaded and validated. Used to test syntax of changes to config. AWS credentials are not needed.DryRun
: All actions short of writing alarms are performed. Used to test what the effects of the config will be on the AWS account.GenerateAlarms
: A full run of the program. You must specifyGenerateAlarms
in order to actually write alarms.
AwsAccessKey
andAwsSecretKey
. Optional. Supply both of these parameters in order to specify AWS credentials on the command line.AwsProfile
Specify a named AWS profile to use for credentials. Optional.AwsRegion
The AWS region to use. Optional, default iseu-west-1
.ConfigFolder
: path to config files. Required.Verbose
: One oftrue
orfalse
. Give more detailed output. Optional, default isfalse
.WriteCloudformationTemplatesToDirectory
. If set, alarms deployed via CloudFormation will be written to this folder instead of deployed. Note that this does not affect SQS and DynamoDb alarms which currently use a different deployment method.
AWS connection credentials will be found in the following order:
- If
AwsAccessKey
andAwsSecretKey
are specified, these will be used. - If
AwsProfile
is specified, the named profile will be used. - Fallback to config file, default profile credentials, federated credentials and environment variables.
Test that the configs can be read and pass validation. AWS credentials are not required for this.
e.g.
dotnet .\Watchman.dll --RunMode TestConfig --ConfigFolder ".\Configs"
Shows what would happen - It does all the reads but none of the writes. AWS credentials are required for this.
e.g.
dotnet .\Watchman.dll --RunMode DryRun --ConfigFolder ".\Configs" --AwsAccessKey AKABC123 --AwsSecretKey abc123 --Verbose true
A full read and write run. AWS credentials are required for this.
e.g.
dotnet .\Watchman.dll --RunMode GenerateAlarms --ConfigFolder ".\Configs" --AwsAccessKey AKABC123 --AwsSecretKey abc123
The user associated with the keys needs to be in several roles. These are all documented in the Security Policy.
Alerts are generated at configurable thresholds on the following CloudWatch metrics:
- DynamoDb:
- ConsumedReadCapacityUnits
- ConsumedWriteCapacityUnits
- ReadThrottleEvents
- WriteThrottleEvents
- SQS:
- ApproximateNumberOfMessagesVisible
- ApproximateAgeOfOldestMessage
When run, Watchman
does things in approximately this order:
- Validate commandline params, and stop if they are invalid.
- Read the config folder and load all alerting groups.
- Validate the alerting groups in the config. Stop if the config is invalid. Stop if the run mode is
TestConfig
. - for each resource type, across all alerting groups:
- Populate resource names. Expand regexp patterns into full resource names that match the pattern.
- For the set of alarm definitions for each service (e.g. DynamoDB, SQS, RDS), apply either the default threshold from those definitions, or from the alerting group, or from the specific resource definition, depending on what is defined.
- Create alarm models and create CloudFormation from them. For legacy reasons, DynamoDB, SQS are different, they put alarms directly. We may convert them later.
- Commit the changes. Skipped if the run mode is
DryRun
. - Report on "orphans", i.e. resources that are not covered by any alarms in alerting group, excluding "CatchAll" groups.
Quartermaster is a reporting tool to examine your dynamo usage. It will send a weekly " dynamo provisioning report" email to the reporting targets. This lists the read and write capacity, provisioned and peak of actual usage, across all all the dynamo tables and their indexes listed in the alerting group for the last week, and the usage as a percentage of provisioned capacity.
The percentage use can be used to track which tables and indexes are approaching the threshold, and which are over-provisioned. The intention is to allow you to change capacities up or down without first needing an alert.
Our production configuration files are kept separately, in an internal repository.