Resource Group: i2-redcap-monitor
Overview
The i2-redcap-monitor
resource group is designed to support various services, including data collection, event logging, monitoring, and alerts within an Azure environment. It primarily utilizes Azure Event Hubs for data ingestion, along with Monitoring and Insights services to ensure system performance and security. This environment is intended to be used for applications that require robust data connection and management, facilitating analytics and operational insights.
Resources
-
Event Hub Namespace:
i2db-redcapprod
- Type:
Microsoft.EventHub/namespaces
- Location: Central US
- Relationship: Serves as a hub for streaming data. It has event hubs configured for various logging purposes.
- Configurations:
- Geo-Replication: Enabled, with location as Central US.
- Public Network Access: Enabled, allowing external access.
- Zone Redundant: True, ensuring availability during failures.
- Type:
-
Action Group:
azure_infra_Group
- Type:
microsoft.insights/actionGroups
- Location: Global
- Relationship: This action group is triggered by alerts from different monitored resources.
- Configurations:
- Email Notifications: Sends alerts to
alvinn@wustl.edu
.
- Email Notifications: Sends alerts to
- Type:
-
Data Collection Rule:
MSVMI-RedCap-Dev_VM
- Type:
Microsoft.Insights/dataCollectionRules
- Location: Central US
- Purpose: Collects telemetry data from Virtual Machines and aggregates it to specified destinations.
- Relationships:
- Log Analytics Workspace: It collects data to
IcsrRdcapResourcesWorkspcae
.
- Log Analytics Workspace: It collects data to
- Type:
-
Private Endpoint:
I2db-prod-plunk
- Type:
Microsoft.Network/privateEndpoints
- Location: Central US
- IP Address:
10.24.96.154
- Purpose: Establishes a private link connection to the
i2db-rdcprod-splunk
Event Hub, restricting network access for enhanced security. - Subnet: Connected to the subnet named
main
within thei2-redcap_main_vnet
.
- Type:
-
Event Hubs (Multiple)
- Names:
i2db-appgw-logs
i2db-app-svc-logs
i2db-database-logs
i2db-vmnic-logs
- Type:
Microsoft.EventHub/namespaces/eventhubs
- Purpose: To handle various logs and data inputs from different applications/services. Each hub is configured with retention policies to manage log lifetimes.
- Configurations:
- Message Retention: Varies by event hub, typically from 1 hour to 7 hours.
- Names:
-
Network Rulesets
- Event Hub Namespace:
i2db-rdcapprod
- Default Action: Allow for public access.
- Security: Has an associated network ruleset for managing access and connections.
- Event Hub Namespace:
-
Activity Log Alerts:
Redcap_MySQl_Admin_Actions
- Type:
microsoft.insights/activityLogAlerts
- Location: Global
- Purpose: Monitors and alerts on administrative actions in MySQL flexible servers.
- Relationships: Monitors various MySQL flexible servers defined in the parameters.
- Type:
-
Metric Alerts:
Redcap_VM_CPU_Utilization
- Type:
microsoft.insights/metricAlerts
- Location: Global
- Purpose: Monitors CPU utilization across various VMs.
- Alert Criteria: Triggered if CPU exceeds 60%.
- Type:
Data Storage
Data within this resource group is primarily stored in Azure Event Hubs, which act as a centralized service for data ingestion. Each Event Hub corresponds to different log data types, maintaining lean and effective management of telemetry and operational data. Real-time data can flow from various sources (VMs, services, etc.) into these hubs for further processing and analysis, ensuring a structured data collection mechanism.
Networking
The i2-redcap-main-vnet
virtual network is utilized within this resource model. Here are some key configurations:
- Subnet: There is a subnet named
main
which hosts the private endpointI2db-prod-plunk
. - Private Endpoint: Ensures that resources can communicate with the
i2db-rdcprod-splunk
Event Hub securely through the private IP10.24.96.154
. - Public Network Access: Some Event Hubs have public access enabled, which must be cautiously managed to prevent unauthorized access.
Security Overview
Security is a critical aspect of the configurations in this resource group. Below are some observations and recommendations:
- Public Network Access: Some Event Hubs are publicly accessible. Ensure that access control policies are strictly enforced to limit access and avoid unwanted data exposure.
- Private Endpoints: Utilization of private endpoints is a good practice as it restricts public access and enables secure connectivity to resources over a private link.
- Network Rulesets: Consider restricting access to certain IP ranges rather than allowing all public access, especially for resources involving sensitive data.
- Monitoring Alerts: Set up extensive alerting around any changes to the access control policies of the Event Hubs and private endpoints.
Other Information
- Cost Management: Monitor usage of Event Hubs and associated services to maintain cost efficiency. Azure Event Hubs typically incurs charges based on throughput, data retention, and ingress/egress data operations.
- Scalability: Ensure that Event Hubs and Log Analytics resources are scaled appropriately based on expected traffic, application workloads, or telemetry volume.
- Future Considerations: Depending on system growth and data usage, consider implementing additional metrics and logging capabilities to improve incident response and maintain a proactive stance toward performance monitoring.