You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AWS Lambda allows you to run code without the burden of provisioning or managing servers. The AWS Lambda App is a unified logs and metrics app for monitoring operation and performance trends in the Lambda functions in your account.
11
+
AWS Lambda allows you to run code without the burden of provisioning or managing servers. The AWS Lambda App is a unified logs and metrics app for monitoring operations and performance trends in the Lambda functions in your account.
12
12
13
-
The Sumo Logic AWS Lambda App uses the Lambda logs via CloudWatch, CloudWatch Metrics and the CloudTrail Lambda Data Events to visualize the operational and performance trends in all the Lambda functions in your account. The preconfigured dashboards provide insights into executions, memory and duration (including cold start) usage by function versions or aliases, errors, billed duration, function callers, IAM users and threat details.
13
+
The Sumo Logic AWS Lambda App uses the Lambda logs via CloudWatch, CloudWatch Metrics, and the CloudTrail Lambda Data Events to visualize the operational and performance trends in all the Lambda functions in your account. The preconfigured dashboards provide insights into executions, memory, and duration (including cold start) usage by function versions or aliases, errors, billed duration, function callers, IAM users, and threat details.
14
14
15
15
## Log and Metric Types
16
16
17
-
This section describes the data sources for the AWS Lambda app and how these the app leverages these data sources to provide insight into AWS Lambda.
17
+
This section describes the data sources for the AWS Lambda app and how the app leverages these data sources to provide insight into AWS Lambda.
18
18
19
19
The AWS Lambda app uses the following logs and metrics:
@@ -23,28 +23,28 @@ The AWS Lambda app uses the following logs and metrics:
23
23
24
24
### AWS CloudWatch Logs
25
25
26
-
AWS Lambda monitors Lambda functions, and reports metrics through Amazon CloudWatch. Lambda then logs all requests handled by your function and stores logs through [AWS CloudWatch Logs](https://docs.aws.amazon.com/lambda/latest/dg/monitoring-functions-logs.html).
26
+
AWS Lambda monitors Lambda functions and reports metrics through Amazon CloudWatch. Lambda then logs all requests handled by your function and stores logs through [AWS CloudWatch Logs](https://docs.aws.amazon.com/lambda/latest/dg/monitoring-functions-logs.html).
27
27
28
-
The Sumo Logic AWS Lambda App uses the Lambda logs via CloudWatch, CloudWatch Metrics and the CloudTrail Lambda Data Events to visualize the operational and performance trends in all the Lambda functions in your account. The preconfigured dashboards provide insights into executions, memory and duration (including cold start) usage by function versions or aliases, errors, billed duration, function callers, IAM users and threat details.
28
+
The Sumo Logic AWS Lambda App uses the Lambda logs via CloudWatch, CloudWatch Metrics, and the CloudTrail Lambda Data Events to visualize the operational and performance trends in all the Lambda functions in your account. The preconfigured dashboards provide insights into executions, memory, and duration (including cold start) usage by function versions or aliases, errors, billed duration, function callers, IAM users, and threat details.
[CloudTrail Lambda Data Events](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-and-data-events-with-cloudtrail.html#logging-data-events) allow you to continuously monitor the execution activity of your Lambda functions, and to record details on when and by whom an Invoke API call was made.
34
+
[CloudTrail Lambda Data Events](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-and-data-events-with-cloudtrail.html#logging-data-events) allow you to continuously monitor the execution activity of your Lambda functions and to record details on when and by whom an Invoke API call was made.
35
35
36
36
The Sumo Logic App for AWS Lambda provide insights into the Lambda Functions invocation by Function name, version, AWS service, and threat details, by using the CloudTrail Lambda Data Events that capture and record the activities in your Lambda functions.
AWS Lambda automatically monitors functions on your behalf, reporting [AWS Lambda metrics](https://docs.aws.amazon.com/lambda/latest/dg/monitoring-functions-metrics.html) through Amazon CloudWatch. These metrics are collected by our Hosted Collector by configuring Amazon CloudWatch source.
42
+
AWS Lambda automatically monitors functions on your behalf, reporting [AWS Lambda metrics](https://docs.aws.amazon.com/lambda/latest/dg/monitoring-functions-metrics.html) through Amazon CloudWatch. These metrics are collected by our Hosted Collector by configuring the Amazon CloudWatch source.
43
43
44
44
The Sumo Logic App for AWS Lambda provide insights into the Lambda Functions invocations, IteratorAge for stream-based invocations, Errors, Dead Letter Errors, Concurrent Executions, Unreserved Concurrent Executions, Duration, Throttles by Function and Time based Comparison.
45
45
46
46
### Sample log messages
47
-
This section provides sample Amazon CloudWatch Log and CloudTrail Lambda Data Events log messages.
47
+
This section provides sample Amazon CloudWatch Logs and CloudTrail Lambda Data Events log messages.
48
48
49
49
```json title="Amazon CloudWatch Log"
50
50
{
@@ -147,10 +147,10 @@ Sumo supports several methods for collecting Lambda logs from Amazon CloudWatch.
147
147
-**AWS Kinesis Firehose for Logs**. Configure an [AWS Kinesis Firehose for Logs](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-logs-source/#create-an-aws-kinesis-firehose-for-logssource) (Recommended).
148
148
-**Lambda Log Forwarder**. Configure a collection of Amazon CloudWatch Logs using our AWS Lambda function using a Sumo Logic provided CloudFormation template, as described in [Amazon CloudWatch Logs](/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/) or configure collection without using CloudFormation, see [Collect Amazon CloudWatch Logs using a Lambda Function](/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-lambda-function/).<br/>
149
149
150
-
* While configuring the cloudwatch log source, following Fields can be added in the source:
150
+
* While configuring the CloudWatch log source, the following Fields can be added in the source:
151
151
* Add an **account** field and assign it a value that is a friendly name/alias to your AWS account from which you are collecting logs. Logs can be queried via the **account** field.
152
152
* Add a **region** field and assign it the value of the respective AWS region where the Lambda function exists.
153
-
* Add an **accountId** field and assign it the value of the respective AWS account ID that is being used.
153
+
* Add an **accountId** field and assign it the value of the respective AWS account ID being used.
Continue with the process of [enabling Provisioned Concurrency configurations](#enable-provisioned-concurrency-configurations-for-lambda-functions) for Lambda functions, as necessary.
187
+
Continue with the process of [enabling Provisioned Concurrency configurations](#enable-provisioned-concurrency-configurations-for-lambda-functions) for Lambda functions, as needed.
188
188
189
189
190
190
### Enable Provisioned Concurrency configurations for Lambda functions
191
191
192
-
AWS Lambda provides Provisioned Concurrency for greater control over the startup time for Lambda functions. When enabled, [Provisioned Concurrency](https://docs.aws.amazon.com/lambda/latest/dg/provisioned-concurrency.html) keeps functions initialized and hyper-ready to respond in double-digit milliseconds. AWS Lambda provides additional metrics for provisioned concurrency with CloudWatch.
192
+
AWS Lambda provides Provisioned Concurrency for greater control over the start-up time for Lambda functions. When enabled, [Provisioned Concurrency](https://docs.aws.amazon.com/lambda/latest/dg/provisioned-concurrency.html) keeps functions initialized and hyper-ready to respond in double-digit milliseconds. AWS Lambda provides additional metrics for provisioned concurrency with CloudWatch.
193
193
194
194
To collect the metrics in Sumo Logic, follow the steps below:
195
195
@@ -213,7 +213,7 @@ These metrics can then be queried using Sumo Logic [Metrics queries](/docs/metri
213
213
214
214
### Field in Field Schema
215
215
216
-
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Fields**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Fields**. You can also click the **Go To...** menu at the top of the screen and select **Fields**.
216
+
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Fields**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu, select **Configuration**, and then under **Logs** select **Fields**. You can also click the **Go To...** menu at the top of the screen and select **Fields**.
217
217
1. Search for the “**functionname**” field.
218
218
1. If not present, create it. Learn how to create and manage fields [here](/docs/manage/fields.md#manage-fields).
In case you have a centralized collection of CloudTrail logs and are ingesting them from all accounts into a single Sumo Logic CloudTrail log source, create following Field Extraction Rule to map proper AWS account(s) friendly name / alias. Create it if not already present / update it as required.
248
+
In case you have a centralized collection of CloudTrail logs and are ingesting them from all accounts into a single Sumo Logic CloudTrail log source, create the following Field Extraction Rule to map the proper AWS account(s) friendly name/alias. Create it if not already present / update it as required.
Enter a parse expression to create an “account” field that maps to the alias you set for each subaccount. For example, if you used the `“dev”` alias for an AWS account with ID `"528560886094"` and the `“prod”` alias for an AWS account with ID `"567680881046"`, your parse expression would look like:
258
+
Enter a parse expression to create an “account” field that maps to the alias you set for each sub-account. For example, if you used the `“dev”` alias for an AWS account with ID `"528560886094"` and the `“prod”` alias for an AWS account with ID `"567680881046"`, your parse expression would look like:
259
259
260
260
```sql
261
261
| json "recipientAccountId"
@@ -289,15 +289,15 @@ import AppInstall from '../../reuse/apps/app-install.md';
289
289
290
290
## Viewing AWS Lambda dashboards
291
291
292
-
Here are some of the measurements and calculations underlying the information presented in dashboard panels.
292
+
The following measurements and calculations drive the information shown in the dashboard panels:
293
293
294
294
* **Duration (ms).** This represents the function duration as the elapsed wall clock time, in milliseconds, from when a function starts executing as a result of an invocation to when it stops executing. Function duration is a measure of performance. **Billed Duration** for an invocation is the value of duration rounded up to the nearest 100 milliseconds.
295
295
* **Memory Size**. The amount of memory allocated for a function.
296
296
* **Max Memory (MB) Used.** The amount of memory used by a function, in MBs. This is a measure of performance.
297
297
* **Compute Usage (GBs).** This is a product of Memory Size and Billed Duration (Memory Size * Billed Duration).
298
298
* **Billed Compute.** memory configured on the function (in GB) x duration of the request (in seconds). In the actual query, Sumo Logic converts MB to GB and milliseconds to seconds to get the real billing numbers used. The actual cost varies by customer. This measurement is used to measure cost.
299
299
* **Unused Memory.** This is Memory Size - Max Memory Used = Unused Memory. Because you are billed based on Memory Size (which you allocate), this is an indicator of not allocating appropriately.
300
-
* **IteratorAge.** This AWS Lambda CloudWatch metric is emitted for stream-based invocations (functions triggered by an Amazon DynamoDB stream or Kinesis stream). Measures, in milliseconds, the age of the last record for each batch of records processed. Age is the difference between the time Lambda received the batch, and the time the last record in the batch was written to the stream.
300
+
* **IteratorAge.** This AWS Lambda CloudWatch metric is emitted for stream-based invocations (functions triggered by an Amazon DynamoDB stream or Kinesis stream). Measures, in milliseconds, the age of the last record for each batch of records processed. Age is the difference between the time Lambda received the batch and the time the last record in the batch was written to the stream.
301
301
302
302
303
303
### Overview
@@ -309,8 +309,8 @@ Use this dashboard to:
309
309
* Identify and resolve the top error messages across your Lambda functions.
310
310
* Quickly identify top error messages, slow-performing Lambda functions, and functions using the most resources.
311
311
* Monitor provisioned concurrency invocations, executions, and utilization.
312
-
* Identify and validate the top IAM Users and AWS services invoke AWS Lambda functions.
313
-
* Monitor cold start duration for lambda functions.
312
+
* Identify and validate the top IAM Users and AWS services that invoke AWS Lambda functions.
313
+
* Monitor cold start duration for Lambda functions.
**AWS Lambda - Usage Analysis** dashboard offers insights into function usage, including invocations, calling AWS services, user agents, IAM users, and detailed information about function callers.
335
335
336
336
:::note
337
-
This dashboard provides analysis of AWS CloudTrail Data Events. By default, AWS CloudTrail does not log data events. To enable AWS CloudTrail data events, Refer to [AWS Lambda Data Event](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events-console)
337
+
This dashboard provides analysis of AWS CloudTrail Data Events. By default, AWS CloudTrail does not log data events. To enable AWS CloudTrail data events, refer to [AWS Lambda Data Event](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events-console)
338
338
:::
339
339
340
340
Use this dashboard to:
@@ -350,17 +350,17 @@ Use this dashboard to:
350
350
351
351
### Error Analysis
352
352
353
-
The **AWS Lambda - Error Analysis** dashboard provides insights on errors and warnings in your AWS Lambda functions.
353
+
The **AWS Lambda - Error Analysis** dashboard provides insights into errors and warnings in your AWS Lambda functions.
354
354
355
355
Use this dashboard to:
356
356
* Quickly identify the top errors and warnings across a Lambda function and its version.
357
357
* Prioritize the resolution of errors and warnings across all Lambda functions.
358
-
* Monitor the trend for the number of deadletter errors; when a Lambda is unable to write the failed event payload to your function's dead-letter queue.
358
+
* Monitor the trend for the number of dead-letter errors when a Lambda is unable to write the failed event payload to your function's dead-letter queue.
359
359
* Monitor the trend for the number of Lambda function throttling events; the number of Lambda function invocation attempts throttled due to invocation rates exceeding the configured concurrent limits.
360
-
* Monitor the trend for Iterator Age applicable for your stream-based invocations only. This measures the age of the last record for each batch of records processed. Age is the difference between the time Lambda received the batch, and the time the last record in the batch was written to the stream.
361
-
* Monitor the trend for the number of async event drops, This indicates the number of asynchronous invocation requests that were dropped due to internal service errors or exceeding service limits.
362
-
* Monitor the trend for recursive invocation drops, This measures the number of recursive invocation attempts that were dropped to prevent potential infinite loops and unbounded recursion within Lambda functions.
363
-
* Monitor the trend for destination delivery failures, This tracks the number of times Lambda failed to deliver an asynchronous invocation result to a configured destination, such as an SNS topic, SQS queue, or EventBridge.
360
+
* Monitor the trend for Iterator Age applicable for your stream-based invocations only. This measures the age of the last record for each batch of records processed. Age is the difference between the time Lambda received the batch and the time the last record in the batch was written to the stream.
361
+
* Monitor the trend for the number of async event drops. This indicates the number of asynchronous invocation requests that were dropped due to internal service errors or exceeding service limits.
362
+
* Monitor the trend for recursive invocation drops. This measures the number of recursive invocation attempts that were dropped to prevent potential infinite loops and unbounded recursion within Lambda functions.
363
+
* Monitor the trend for destination delivery failures. This tracks the number of times Lambda failed to deliver an asynchronous invocation result to a configured destination, such as an SNS topic, SQS queue, or EventBridge.
* Monitor the memory usage pattern of a Lambda function during its execution.
374
-
* Monitor time taken by function for execution, particularly to understand the unbilled duration.
374
+
* Monitor the time taken by the function for execution, particularly to understand the unbilled duration.
375
375
* Monitor the compute usage by function.
376
376
* Monitor claimed account concurrency at the account level, segmented by region.
377
377
@@ -396,7 +396,7 @@ Use this dashboard to:
396
396
**AWS Lambda - Threat Intel** dashboard provides insights into incoming requests to your AWS Lambda functions from malicious sources determined via Sumo Logic [threat intelligence](/docs/security/threat-intelligence/). Panels show detailed information on malicious IPs and the malicious confidence of each threat.
397
397
398
398
Use this dashboard to:
399
-
* Identify known malicious IPs that are access your load-balancers and use firewall access control lists to prevent them from sending you traffic going forward
399
+
* Identify known malicious IPs that are accessing your load-balancers and use firewall access control lists to prevent them from sending you traffic going forward
400
400
* Monitor the malicious confidence level for all incoming malicious IP address threats.
0 commit comments