Monitor CloudWatch logs

edit

In this section, you’ll learn how to export log events from CloudWatch logs to an Elastic cluster by using Amazon Data Firehose.

You’ll go through the following steps:

  • Install AWS integration in Kibana
  • Select a CloudWatch log group to monitor
  • Create a delivery stream in Amazon Data Firehose
  • Set up a subscription filter to forward the logs using the Firehose stream
  • Visualize your logs in Kibana
Before you begin
edit

We assume that you already have:

  • An AWS account with permissions to pull the necessary data from AWS.
  • A deployment using our hosted Elasticsearch Service on Elastic Cloud. The deployment includes an Elasticsearch cluster for storing and searching your data, and Kibana for visualizing and managing your data. AWS Data Firehose works with Elastic Stack version 7.17 or greater, running on Elastic Cloud only.

AWS PrivateLink is not supported. Make sure the deployment is on AWS, because the Amazon Data Firehose delivery stream connects specifically to an endpoint that needs to be on AWS.

Step 1: Install AWS integration in Kibana
edit
  1. In Kibana, navigate to Management > Integrations and browse the catalog to find the AWS integration.
  2. Navigate to the Settings tab and click Install AWS assets.
Step 2: Select a CloudWatch log group to monitor
edit
CloudWatch log group

In this tutorial, you are going to collect application logs from an AWS Lambda-based app and forward them to Elastic.

Create a Lambda function

You can skip this section if you already have a Lambda function, or any other service or application that sends logs to a CloudWatch log group. Take note of the log group from which you want to collect log events and move to the next section.

Like many other services and platforms in AWS, Lambda functions natively log directly to CloudWatch out of the box.

  1. Go to the AWS console and open the AWS Lambda page.
  2. Click Create function and select the option to create a function from scratch.
  3. Select a Function name.
  4. As a Runtime, select a recent version of Python. For example, Python 3.11.
  5. Select your Architecture of choice between arm64 and x86_64.
  6. Confirm and create the Lambda function.

    When AWS finishes creating the function, go to the Code source section and paste the following Python code as function source code:

    import json
    
    def lambda_handler(event, context):
        print("Received event: " + json.dumps(event))
  7. Click Deploy to deploy the changes to the source code.

Generate some sample logs

With the function ready to go, you can invoke it a few times to generate sample logs. On the function page, follow these steps:

  1. Select Test.
  2. Select the option to create a new test event.
  3. Name the test event and Save the changes.
  4. Click the Test button to execute the function.

Visit the function’s log group. Usually, the AWS console offers a handy link to jump straight to the log group it created for this function’s logs. You should get something similar to the following:

CloudWatch log group with sample logs

Take note of the log group name for this Lambda function, as you will need it in the next steps.

Step 3: Create a stream in Amazon Data Firehose
edit
Amazon Firehose Stream
  1. Go to the AWS console and navigate to Amazon Data Firehose.
  2. Click Create Firehose stream and choose the source and destination of your Firehose stream. Unless you are streaming data from Kinesis Data Streams, set source to Direct PUT and destination to Elastic.
  3. Provide a meaningful Firehose stream name that will allow you to identify this delivery stream later.

    For advanced use cases, source records can be transformed by invoking a custom Lambda function. When using Elastic integrations, this should not be required.

  4. In the Destination settings section, set the following parameter: es_datastream_name = logs-aws.generic-default

The Firehose stream is now ready to send logs to your Elastic Cloud deployment.

Step 4: Send Lambda function log events to a Firehose stream
edit
CloudWatch subscription filter

To send log events from CloudWatch to Firehose, open the log group where the Lambda service is logging and create a subscription filter.

Create a subscription filter for Amazon Data Firehose

The subscription filter allows you to pick log events from the log group and forward them to other services, such as an Amazon Kinesis stream, an Amazon Data Firehose stream, or AWS Lambda.

  1. On the log group page, select Subscription filters and click the Create Amazon Data Firehose subscription filter button.

From here, follow these steps:

  1. Choose a destination. Select the Firehose stream you created in the previous step.
  2. Grant the CloudWatch service permission to send log events to the stream in Firehose:

    1. Create a new role with a trust policy that allows CloudWatch service to assume the role.
    2. Assign a policy to the role that permits "putting records" into a Firehose stream.
  3. Create a new IAM role and use the following JSON as the trust policy:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Principal": {
                    "Service": "logs.<REGION>.amazonaws.com"
                },
                "Action": "sts:AssumeRole",
                "Condition": {
                    "StringLike": {
                        "aws:SourceArn": "arn:aws:logs:<REGION>:<ACCOUNT_ID>:*"
                    }
                }
            }
        ]
    }
  4. Assign a policy to the IAM role by using the following JSON file:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": "firehose:PutRecord",
                "Resource": "arn:aws:firehose:<REGION>:<ACCOUNT_ID>:deliverystream/<YOUR_FIREHOSE_STREAM>"
            }
        ]
    }

When the new role is ready, you can select it in the subscription filter.

  1. Configure log format and filters. Select the "Other" in the Log format option.
  2. Set log format and filters

    If you want to forward all log events, you can empty the filter pattern. You can use the Subscription filter pattern to forward only the log events that match the pattern. The Test pattern tool on the same page allows you to test filter patterns before creating the subscription filter.

  3. Generate additional logs.

    Open the AWS Lambda page again, select the function you created, and execute it a few times to generate new log events.

Check if there are destination error logs

On the AWS console, navigate to your Firehose stream and check for entries in the Destination error logs section.

If everything is running smoothly, this list is empty. If there’s an error, you can check the details. The following example shows a delivery stream that fails to send records to the Elastic stack due to bad authentication settings:

Firehose destination errors

The Firehose delivery stream reports:

  • The number of failed deliveries.
  • The failure detail.
Step 5: Visualize your logs in Kibana
edit
Vizualize logs in Kibana

With the logs streaming to the Elastic stack, you can now visualize them in Kibana.

In Kibana, navigate to the Discover page and select the index pattern that matches the Firehose stream name. Here is a sample of logs from the Lambda function you forwarded to the logs-aws.generic-default data stream:

Sample logs in Discover