evergreen/docs/developer/meetings/2018-05-30-JENKINS-51299-de.../README.adoc

2.2 KiB
Raw Blame History

<html lang="en"> <head> </head>

2018-05-30How to provide access to Essentials logs to some Jenkins developers

Table of Contents

Notes

Context

Now JENKINS-49811 (and the associated JEP 308) are done, we need to move forward and see how we will actually provide access to the generated logs to a given subset of plugin developers.

That work is tracked as JENKINS-51299.

Attendees

  • Olivier Vernin

  • Baptiste Mathus

Summary

Azure Log Analytics is the service in use for logging in the new Kubernetes cluster used for the Jenkins infrastructure.

  • Olivier says it is not integrated, and cannot be, with the existing Jenkins LDAP. To use roles/users in Azure, it has to use the existing Active Directory setup there. So, a possibility could be to just run a job, each hour for instance, to sync the external (OpenLDAP) LDAP data, to the Active Directory service in the Azure account for the Jenkins Project. The master data would stay on the external LDAP, and the Active Directory side would be in read-only and reset regularly from the master one.

  • DataDog was quickly discussed, but ditched because there does not seem anyway to be a way to segregate the things/logs people would have access to.

  • Another possibility, failing an easy path above, would be to set up a dedicated ELK cluster for those logs. But we want to avoid it because it would be time consuming to set up and operate exclusively for Jenkins Essentials needs.

So, we ended up agreeing that Olivier would check what is feasible with regard to data visibility/segregation on Azure Logs Analytics side.

This work is tracked through INFRA-1643

Actions

ACTION

Person

Work on INFRA-1643 to have more insights of what is doable.

Olivier

</html>