Skip to content

Commit 330d6cb

Browse files
committed
Continue with send-data images
1 parent cf538ca commit 330d6cb

30 files changed

+139
-178
lines changed

docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-cloudformation-template-with-secured-sumo-endpoint.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@ sidebar_label: Collect Logs using CloudFormation with Secured Endpoint
55
description: Learn how to collect Amazon CloudWatch Logs using a CloudFormation template with secured Sumo Logic endPoint.
66
---
77

8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
810
:::note
911
We strongly recommend the alternative collection process described on [AWS Kinesis Firehose for Logs Source](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-logs-source/), which is more robust and reliable, where you do not need to manage resources. Lambda based collection methods are limited by time out, concurrency, and memory limits.
1012
:::
@@ -48,7 +50,7 @@ If you're using the AWS Console, do the following:
4850
* **Type**. Select SecureString.
4951
* **KMS Key Source**. Select the KMS Key ID or use the default KMS key.
5052
* **Value**. Paste the value of the SUMO_ENDPOINT_URL copied while creating the HTTP source.
51-
1. Click **Create Parameter**.<br/> ![Create_SecureString_Parameter.png](/img/send-data/Create_SecureString_Parameter.png)
53+
1. Click **Create Parameter**.<br/><img src={useBaseUrl('img/send-data/Create_SecureString_Parameter.png')} alt="Create Parameter" style={{border: '1px solid gray'}} width="800" />
5254

5355
:::note
5456
You can verify whether the parameter is created successfully by going to https://console.aws.amazon.com/systems-manager/parameters/?region=us-east-1&tab=Table and looking for parameter `SUMO_ENDPOINT`.
@@ -71,16 +73,12 @@ For instructions, follow [Step 3](/docs/send-data/collect-from-other-data-source
7173

7274
1. Log in to the [AWS Management Console](https://s3.console.aws.amazon.com/).
7375
1. Under **Management Tools**, select **CloudFormation**.
74-
1. Create a new stack by clicking **Create Stack**, then select **With new resources (standard).** <br/> ![Create_Stack_on_AWS_1.gif](/img/send-data/Create_Stack_on_AWS_1.gif)
76+
1. Create a new stack by clicking **Create Stack**, then select **With new resources (standard).** <br/><img src={useBaseUrl('img/send-data/Create_Stack_on_AWS_1.gif')} alt="Create stack on AWS" style={{border: '1px solid gray'}} width="600" />
7577
1. On the **Specify Template** window, do one of the following:
7678

77-
* If you have downloaded and optionally modified the CloudFormation template, choose to **Upload a template file**, upload the `DLQLambdaCloudFormationWithSecuredEndpoint.json` file, and then click **Next**.
78-
79-
![Create_Stack_on_AWS_2.png](/img/send-data/Create_Stack_on_AWS_2.png)
79+
* If you have downloaded and optionally modified the CloudFormation template, choose to **Upload a template file**, upload the `DLQLambdaCloudFormationWithSecuredEndpoint.json` file, and then click **Next**.<br/><img src={useBaseUrl('img/send-data/Create_Stack_on_AWS_2.png')} alt="Upload a template file" style={{border: '1px solid gray'}} width="500" />
8080

81-
* Otherwise, if you did not modify the CloudFormation template, select **Specify an Amazon S3 template URL** and enter: `https://s3.amazonaws.com/appdev-cloudformation-templates/DLQLambdaCloudFormationWithSecuredEndpoint.json`
82-
83-
![Create_Stack_on_AWS_3.png](/img/send-data/Create_Stack_on_AWS_3.png)
81+
* Otherwise, if you did not modify the CloudFormation template, select **Specify an Amazon S3 template URL** and enter: `https://s3.amazonaws.com/appdev-cloudformation-templates/DLQLambdaCloudFormationWithSecuredEndpoint.json`<br/><img src={useBaseUrl('img/send-data/Create_Stack_on_AWS_3.png')} alt="Specify an Amazon S3 template URL" style={{border: '1px solid gray'}} width="500" />
8482

8583
1. Select **Next** and the **Specify Stack Details** window appears. Enter the following:
8684
* **Stack Name**.
@@ -94,9 +92,7 @@ For instructions, follow [Step 3](/docs/send-data/collect-from-other-data-source
9492
:::
9593

9694
* **NumOfWorkers.** (Optional) Increase this value to speed up the dead letter queue (DLQ) processing.
97-
* **SumoURLDecryptKeyID.** (Required) Enter the Key ID copied from “Get the KMS Key ID” step.
98-
99-
![Create_Stack_on_AWS_4.png](/img/send-data/Create_Stack_on_AWS_4.png)
95+
* **SumoURLDecryptKeyID.** (Required) Enter the Key ID copied from “Get the KMS Key ID” step.<br/><img src={useBaseUrl('img/send-data/Create_Stack_on_AWS_4.png')} alt="Specify stack details" style={{border: '1px solid gray'}} width="800" />
10096

10197
1. Click **Next**. The **Configure Stack Options** screen will appear. You can optionally add AWS tags to tag the resources created by this Cloudformation stack. Click **Next** to get to the final **Review** window.
10298

docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-cloudformation-template.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -164,10 +164,10 @@ If you do not want the `SumoCWSpilloverAlarm` alarm to be created, remove the de
164164

165165
1. Sign in to the [AWS Management Console](https://s3.console.aws.amazon.com).
166166
1. In the **Management Tools** menu, select **CloudFormation**.
167-
1. Create a new stack by clicking **Create Stack**, then select **With new resources (standard)**.<br/> ![CF_animated.gif](/img/send-data/CF_animated.gif)
167+
1. Create a new stack by clicking **Create Stack**, then select **With new resources (standard)**.<br/><img src={useBaseUrl('img/send-data/CF_animated.gif')} alt="Create a new stack" style={{border: '1px solid gray'}} width="600" />
168168
1. On the **Specify Template** window, do one of the following:
169-
* If you have downloaded and optionally modified the CloudFormation template, choose to **Upload a template file**, upload the `DLQLambdaCloudFormation.json` file, and then click **Next**.<br/> ![Create_Stack_dialog.png](/img/send-data/Create_Stack_dialog.png)
170-
* Otherwise, if you did not modify the CloudFormation template, select **Specify an Amazon S3 template URL** and enter: `https://s3.amazonaws.com/appdev-cloudformation-templates/DLQLambdaCloudFormation.json`<br/> ![Create_Stack_dialog_2.png](/img/send-data/Create_Stack_dialog_2.png)
169+
* If you have downloaded and optionally modified the CloudFormation template, choose to **Upload a template file**, upload the `DLQLambdaCloudFormation.json` file, and then click **Next**.<br/><img src={useBaseUrl('img/send-data/Create_Stack_dialog.png')} alt="Upload a template file" style={{border: '1px solid gray'}} width="500" />
170+
* Otherwise, if you did not modify the CloudFormation template, select **Specify an Amazon S3 template URL** and enter: `https://s3.amazonaws.com/appdev-cloudformation-templates/DLQLambdaCloudFormation.json`<br/><img src={useBaseUrl('img/send-data/Create_Stack_dialog_2.png')} alt="Specify an Amazon S3 URL" style={{border: '1px solid gray'}} width="500" />
171171
1. Select **Next** and the **Specify Stack Details** window appears. Enter the following:
172172
* **Stack Name**.
173173
* **EmailID** (Optional) Used for alerts.
@@ -179,7 +179,7 @@ If you do not want the `SumoCWSpilloverAlarm` alarm to be created, remove the de
179179
LogStreamPrefix field does not accept special characters (`[|\\{}()[\]^$+*?.-]`). For example, you can use the comma-separated list like test-name, test-logs as the LogStream name prefixes.
180180
:::
181181
* **NumOfWorkers.** (Optional) Increase this value to speed up dead letter queue (DLQ) processing.
182-
* **SumoEndPointURL** (Required). Enter the HTTP Source Address URL from [Add a Hosted Collector and HTTP Source](#step-1-add-a-hosted-collector-and-http-source).<br/> ![Specify_Stack_Details.png](/img/send-data/Specify_Stack_Details.png)
182+
* **SumoEndPointURL** (Required). Enter the HTTP Source Address URL from [Add a Hosted Collector and HTTP Source](#step-1-add-a-hosted-collector-and-http-source).<br/><img src={useBaseUrl('img/send-data/Specify_Stack_Details.png')} alt="Specify stack details" style={{border: '1px solid gray'}} width="700" />
183183
1. Click **Next**. The **Configure Stack Options** screen will appear. You can optionally add AWS tags to tag the resources created by this CloudFormation stack. Click **Next** to get to the final **Review** window.
184184
1. In the **Review** window, click the checkbox acknowledging that you understand the the template creates IAM resources, and click **Create**.
185185

@@ -205,7 +205,7 @@ If alarm resources in [Step 3](#remove-alarm-resources-optional) is not removed,
205205

206206
Sign in to the email account whose address you provided when performing the configuration described in [Create a stack on the AWS CloudFormation console](#step-4-create-a-stack-on-the-aws-cloudformation-console) above. Look for an email with subject `AWS Notification - Subscription Confirmation`, like the example shown below.
207207

208-
![aws-notification.png](/img/send-data/aws-notification.png)
208+
<img src={useBaseUrl('img/send-data/aws-notification.png')} alt="AWS notification" style={{border: '1px solid gray'}} width="800" />
209209

210210
To validate the email address, click **Confirm subscription** in the email.
211211

docs/send-data/collect-from-other-data-sources/azure-blob-storage/append-blob/collect-logs.md

Lines changed: 15 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -106,13 +106,9 @@ This section provides instructions on authorizing the App Service to list the st
106106

107107
To authorize the App Service to list the storage account key, do the following:
108108

109-
1. Go to **Storage accounts** and click **Access control (IAM)**.
109+
1. Go to **Storage accounts** and click **Access control (IAM)**.<br/><img src={useBaseUrl('img/send-data/AzureBlob_AccessControl_IAM.png')} alt="Azure Blob Access Control IAM" style={{border: '1px solid gray'}} width="400" />
110110

111-
![AzureBlob_AccessControl_IAM.png](/img/send-data/AzureBlob_AccessControl_IAM.png)
112-
113-
1. Click the **Add** **+** at the top of the page.
114-
115-
![AzureBlob_IAM_Add.png](/img/send-data/AzureBlob_IAM_Add.png)
111+
1. Click the **Add** **+** at the top of the page.<br/><img src={useBaseUrl('img/send-data/AzureBlob_IAM_Add.png')} alt="Azure Blob IAM add" style={{border: '1px solid gray'}} width="800" />
116112

117113
1. Select **Add role assignment** from dropdown.
118114
1. In the **Add role assignment** window, go to **Role** tab and choose **Storage Blob Data Reader**. Click **Next**. <br/><img src={useBaseUrl('/img/send-data/storage-blob-data-reader.png')} alt="storage-blob-data-reader" width="800"/>
@@ -131,17 +127,11 @@ This section provides instructions for creating an event grid subscription that
131127

132128
To create an event grid subscription, do the following:
133129

134-
1. In the left pane of the Azure portal click **All Services**, then search for and click **Event Grid Subscriptions**.
135-
136-
![AzureBlob_EventGridSubscriptions.png](/img/send-data/AzureBlob_EventGridSubscriptions.png)
137-
138-
1. At the top of the **Event Subscriptions** page, click **+Event Subscription**.
130+
1. In the left pane of the Azure portal click **All Services**, then search for and click **Event Grid Subscriptions**.<br/><img src={useBaseUrl('img/send-data/AzureBlob_EventGridSubscriptions.png')} alt="Azure Blob Event Grid Subscriptions" style={{border: '1px solid gray'}} width="600" />
139131

140-
![AzureBlob_EventSubscriptionsPage.png](/img/send-data/AzureBlob_EventSubscriptionsPage.png)
132+
1. At the top of the **Event Subscriptions** page, click **+Event Subscription**.<br/><img src={useBaseUrl('img/send-data/AzureBlob_EventSubscriptionsPage.png')} alt="Azure Blob Event Subscription" style={{border: '1px solid gray'}} width="700" />
141133

142-
The Create Event Subscription dialog appears.
143-
144-
![AzureBlob_CreatEventSubscription_dialog.png](/img/send-data/AzureBlob_CreatEventSubscription_dialog.png)
134+
The Create Event Subscription dialog appears.<br/><img src={useBaseUrl('img/send-data/AzureBlob_CreatEventSubscription_dialog.png')} alt="Azure Blob Create Event Subscription dialog" style={{border: '1px solid gray'}} width="800" />
145135

146136
1. Specify the following values for **Event Subscription Details**:
147137

@@ -169,9 +159,7 @@ To create an event grid subscription, do the following:
169159
* **Endpoint Type**. Select **Event Hubs** from the dropdown.
170160
* **Endpoint.** Click on **Select an endpoint.**
171161

172-
The Select Event Hub dialog appears.
173-
174-
![AzureBlob_SelectEventHub-EventGrid.png](/img/send-data/AzureBlob_SelectEventHub-EventGrid.png)
162+
The Select Event Hub dialog appears.<br/><img src={useBaseUrl('img/send-data/AzureBlob_SelectEventHub-EventGrid.png')} alt="Select Event Hub dialog" style={{border: '1px solid gray'}} width="400" />
175163

176164
1. Specify the following Select Event Hub parameters, then click **Confirm Selection.**
177165

@@ -182,9 +170,7 @@ To create an event grid subscription, do the following:
182170
1. Specify the following Filters tab options(Optional):
183171

184172
* Check **Enable subject filtering**.
185-
* To filter events by a container name, enter the following in the **Subject Begins With** field, replacing `<container_name>` with the name of the container from where you want to export logs: `/blobServices/default/containers/<container_name>/`
186-
187-
![img](/img/send-data/AzureBlob_FiltersDialog.png)
173+
* To filter events by a container name, enter the following in the **Subject Begins With** field, replacing `<container_name>` with the name of the container from where you want to export logs: `/blobServices/default/containers/<container_name>/`<br/><img src={useBaseUrl('img/send-data/AzureBlob_FiltersDialog.png')} alt="Create Event Subscription dialog" style={{border: '1px solid gray'}} width="800" />
188174

189175
1. Click **Create**.
190176

@@ -197,21 +183,18 @@ This assumes that your storage account access is enabled for selected networks.
197183
1. Create a subnet in a virtual network using the instructions in the [Azure documentation](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-manage-subnet#add-a-subnet). If you have multiple accounts in the same region, you can skip step 2 given below and use the same subnet and add it to the storage account as mentioned in step 3.
198184
1. Perform the steps below for BlobTaskConsumer function app:
199185
1. Go to **Function App > Settings > Networking**.
200-
1. Under Outbound traffic, click on Vnet Integration. <br/>![azureblob-outbound](/img/send-data/appendblob/azureappendblob-outbound.png)
201-
1. Add the Vnet and subnet created in Step 1. <br/>![azureblob-vnet](/img/send-data/azureblob-vnet.png)
202-
1. Also copy the outbound IP addresses you’ll need to add in the firewall configuration of your storage account. <br/> ![azureblob-outboundip](/img/send-data/azureblob-outboundip.png)
203-
1. Go to your storage account from where you want to collect logs from. Go to Networking and add the same Vnet and subnet. <br/>![azureblob-storageacct](/img/send-data/azureblob-storageacct.png)
186+
1. Under Outbound traffic, click on Vnet Integration. <br/><img src={useBaseUrl('img/send-data/appendblob/azureappendblob-outbound.png')} alt="Azure blob outbound" style={{border: '1px solid gray'}} width="600" />
187+
1. Add the Vnet and subnet created in Step 1. <br/><img src={useBaseUrl('img/send-data/azureblob-vnet.png')} alt="Azure Blob Vnet" style={{border: '1px solid gray'}} width="800" />
188+
1. Also copy the outbound IP addresses you’ll need to add in the firewall configuration of your storage account. <br/><img src={useBaseUrl('img/send-data/azureblob-outboundip.png')} alt="Azure Blob outbound" style={{border: '1px solid gray'}} width="800" />
189+
1. Go to your storage account from where you want to collect logs from. Go to Networking and add the same Vnet and subnet. <br/><img src={useBaseUrl('img/send-data/azureblob-storageacct.png')} alt="Azure Blob Storage account" style={{border: '1px solid gray'}} width="800" />
204190
1. Add the outbound IP addresses (copied in step 2.iv) from both BlobTaskConsumer functions under Firewall with each IP in a single row of Address range column.
205-
1. Verify by going to the subnet. You should see Subnet delegation and service endpoints as shown in the screenshot below. <br/>![azureblob-subnet](/img/send-data/azureblob-subnet.png)
191+
1. Verify by going to the subnet. You should see Subnet delegation and service endpoints as shown in the screenshot below. <br/><img src={useBaseUrl('img/send-data/azureblob-subnet.png')} alt="Azure Blob subnet" style={{border: '1px solid gray'}} width="800" />
206192

207193
## Upgrading Azure Functions
208194

209-
1. Go to the resource group where the ARM template was deployed and go to each of the function apps.
210-
![azurefunctionapp-list](/img/send-data/azure_functionapp.png)
211-
1. Go to `Deployment -> Deployment Center` and click on `Sync`.
212-
![azurefunctionapp-sync](/img/send-data/azure_upgrade_sync.png)
213-
1. Go to `Logs` tab and check the `Status` column, it should show `Success`.
214-
![azurefunctionapp-status](/img/send-data/azure_upgrade_status.png)
195+
1. Go to the resource group where the ARM template was deployed and go to each of the function apps.<br/><img src={useBaseUrl('img/send-data/azure_functionapp.png')} alt="Azure function apps" style={{border: '1px solid gray'}} width="800" />
196+
1. Go to `Deployment -> Deployment Center` and click on `Sync`.<br/><img src={useBaseUrl('img/send-data/azure_upgrade_sync.png')} alt="Azure function app sync" style={{border: '1px solid gray'}} width="800" />
197+
1. Go to `Logs` tab and check the `Status` column, it should show `Success`.<br/><img src={useBaseUrl('img/send-data/azure_upgrade_status.png')} alt="Azure function app status" style={{border: '1px solid gray'}} width="800" />
215198

216199
## Azure Append Blob Limitations
217200

0 commit comments

Comments
 (0)