Skip to content

Commit 9d10de2

Browse files
committed
Updates from review
1 parent c90bb73 commit 9d10de2

File tree

2 files changed

+18
-18
lines changed

2 files changed

+18
-18
lines changed

docs/integrations/amazon-aws/amazon-bedrock-agentcore.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The Amazon Bedrock AgentCore app uses the following logs and metrics:
6868
### Sample CloudWatch logs
6969

7070
<details>
71-
<summary>Runtime Application Logs - Click to expand</summary>
71+
<summary>Runtime Application Logs</summary>
7272

7373
```json title="CloudWatch Runtime Application Logs"
7474
{
@@ -92,7 +92,7 @@ The Amazon Bedrock AgentCore app uses the following logs and metrics:
9292
</details>
9393

9494
<details>
95-
<summary>Memory Application Logs - Click to expand</summary>
95+
<summary>Memory Application Logs</summary>
9696

9797
```json title="CloudWatch Memory Application Logs"
9898
{
@@ -112,7 +112,7 @@ The Amazon Bedrock AgentCore app uses the following logs and metrics:
112112
</details>
113113

114114
<details>
115-
<summary>Gateway Application Logs - Click to expand</summary>
115+
<summary>Gateway Application Logs</summary>
116116

117117
```json title="CloudWatch Gateway Application Logs"
118118
{
@@ -133,7 +133,7 @@ The Amazon Bedrock AgentCore app uses the following logs and metrics:
133133
</details>
134134

135135
<details>
136-
<summary>Built-in Tools Code Interpreter Application Logs - Click to expand</summary>
136+
<summary>Built-in Tools Code Interpreter Application Logs</summary>
137137

138138
```json title="CloudWatch Built-in Tools Code Interpreter Application Logs"
139139
{
@@ -180,7 +180,7 @@ The Amazon Bedrock AgentCore app uses the following logs and metrics:
180180
</details>
181181

182182
<details>
183-
<summary>Usage Logs - Click to expand</summary>
183+
<summary>Usage Logs</summary>
184184

185185
```json title="CloudWatch Usage Logs"
186186
{
@@ -292,11 +292,12 @@ account=* region=* namespace=aws/bedrock/agentcore metric=latency operation=Invo
292292
293293
Sumo Logic supports collecting metrics using two source types:
294294
295-
* Configure an [AWS Kinesis Firehose for Metrics Source](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-metrics-source) (Recommended); or
295+
* Configure an [AWS Kinesis Firehose for Metrics Source](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-metrics-source) (recommended) or
296296
* Configure an [Amazon CloudWatch Source for Metrics](/docs/send-data/hosted-collectors/amazon-aws/amazon-cloudwatch-source-metrics)
297297
298+
When you configure the source:
298299
* Namespace for **Amazon Bedrock AgentCore** Service is **AWS/Bedrock-AgentCore**.
299-
* ​​​**Metadata**. Add an **account** field to the source and assign it a value that is a friendly name/alias to your AWS account from which you are collecting metrics. Metrics can be queried via the "account field".
300+
* ​​​**Metadata**. Add an **account** field to the source and assign it a value that is a friendly name/alias to your AWS account from which you are collecting metrics. Metrics can be queried via the "account field".
300301
301302
### Collecting Amazon Bedrock AgentCore CloudTrail logs
302303
@@ -318,7 +319,7 @@ Sumo Logic supports collecting metrics using two source types:
318319
319320
### Collecting Amazon Bedrock AgentCore CloudWatch logs
320321
321-
To enable Amazon Bedrock AgentCore CloudWatch Logs, follow the steps mentioned in [AWS Documentation](https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/observability.html).
322+
To enable Amazon Bedrock AgentCore CloudWatch Logs, follow the steps mentioned in [AWS documentation](https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/observability.html).
322323
323324
:::note
324325
Ensure that when configuring CloudWatch Logs, the log group names follow these patterns:
@@ -332,16 +333,15 @@ Ensure that when configuring CloudWatch Logs, the log group names follow these p
332333
:::
333334
334335
Sumo Logic supports several methods for collecting logs from Amazon CloudWatch. You can choose either of them to collect logs:
336+
- **AWS Kinesis Firehose for Logs**. Configure an [AWS Kinesis Firehose for Logs](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-logs-source/#create-an-aws-kinesis-firehose-for-logssource) (recommended) or
337+
- **Lambda Log Forwarder**. Configure a collection of Amazon CloudWatch Logs using our AWS Lambda function using a Sumo Logic provided CloudFormation template, as described in [Amazon CloudWatch Logs](/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/), or to configure collection without using CloudFormation see [Collect Amazon CloudWatch Logs using a Lambda Function](/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-lambda-function/).
335338
336-
- **AWS Kinesis Firehose for Logs**. Configure an [AWS Kinesis Firehose for Logs](/docs/send-data/hosted-collectors/amazon-aws/aws-kinesis-firehose-logs-source/#create-an-aws-kinesis-firehose-for-logssource) (Recommended); or
337-
- **Lambda Log Forwarder**. Configure a collection of Amazon CloudWatch Logs using our AWS Lambda function using a Sumo Logic provided CloudFormation template, as described in [Amazon CloudWatch Logs](/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/) or configure collection without using CloudFormation, see [Collect Amazon CloudWatch Logs using a Lambda Function](/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-lambda-function/).
338-
339-
- While configuring the CloudWatch log source, the following fields can be added to the source:
339+
While configuring the CloudWatch log source, the following fields can be added to the source:
340340
- Add an **account** field and assign it a value which is a friendly name/alias to your AWS account from which you are collecting logs. Logs can be queried via the **account** field.
341341
- Add a **region** field and assign it the value of the respective AWS region where the **Bedrock AgentCore** exists.
342342
- Add an **accountId** field and assign it the value of the respective AWS account ID that is being used.
343343
344-
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/AWS-Lambda/lamda-cw-logs-source-fields.png')} alt="Fields" />
344+
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/AWS-Lambda/lamda-cw-logs-source-fields.png')} alt="Fields" style={{border: '1px solid gray'}} width="400" />
345345
346346
### Configure fields in field schema
347347
@@ -412,15 +412,15 @@ Scope (Specific Data): account=* region=* _sourcehost=/aws/vendedlogs/bedrock-ag
412412
413413
### Centralized AWS CloudTrail logs collection
414414
415-
In case you have a centralized collection of CloudTrail logs and are ingesting them from all accounts into a single Sumo Logic CloudTrail log source, create the following Field Extraction Rule to map a proper AWS account(s) friendly name/alias. Create it if not already present / update it as required.
415+
In case you have a centralized collection of CloudTrail logs and are ingesting them from all accounts into a single Sumo Logic CloudTrail log source, create the following Field Extraction Rule to map a proper AWS account friendly name/alias. Create it if not already present / update it as required.
416416
417417
```sql
418418
Rule Name: AWS Accounts
419419
Applied at: Ingest Time
420420
Scope (Specific Data): _sourceCategory=aws/observability/cloudtrail/logs
421421
```
422422
423-
**Parse Expression**:
423+
#### Parse expression
424424
425425
Enter a parse expression to create an "account" field that maps to the alias you set for each sub-account. For example, if you used the `"dev"` alias for an AWS account with ID `"123456789012"` and the `"prod"` alias for an AWS account with ID `"567680881046"`, your parse expression would look like:
426426
@@ -435,15 +435,15 @@ Enter a parse expression to create an "account" field that maps to the alias you
435435
436436
### Centralized CloudWatch logs collection
437437
438-
In case you have a centralized collection of CloudWatch logs and are ingesting them from all accounts into a single Sumo Logic CloudWatch log source, create the following Field Extraction Rule to map a proper AWS account(s) friendly name/alias. Create it if not already present / update it as required.
438+
In case you have a centralized collection of CloudWatch logs and are ingesting them from all accounts into a single Sumo Logic CloudWatch log source, create the following Field Extraction Rule to map a proper AWS account friendly name/alias. Create it if not already present, or update it as required.
439439
440440
```sql
441441
Rule Name: AWS Accounts
442442
Applied at: Ingest Time
443443
Scope (Specific Data): _sourceCategory=aws/observability/cloudwatch/logs
444444
```
445445
446-
**Parse Expression**:
446+
#### Parse expression
447447
448448
Enter a parse expression to create an "account" field that maps to the alias you set for each sub-account. For example, if you used the `"dev"` alias for an AWS account with ID `"123456789012"` and the `"prod"` alias for an AWS account with ID `"567680881046"`, your parse expression would look like:
449449

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
3333
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-appflow-logo.png')} alt="Thumbnail icon" width="50"/> |[ Amazon AppFlow](https://aws.amazon.com/appflow/) | App: [Amazon AppFlow](/docs/integrations/amazon-aws/amazon-appflow/) |
3434
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-appstream2-logo.png')} alt="Thumbnail icon" width="50"/> | [Amazon AppStream 2.0](https://aws.amazon.com/appstream2/) | App: [Amazon AppStream 2.0](/docs/integrations/amazon-aws/amazon-appstream2/) |
3535
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-athena-logo.png')} alt="Thumbnail icon" width="50"/> | [Amazon Athena](https://aws.amazon.com/athena/) | App: [Amazon Athena](/docs/integrations/amazon-aws/amazon-athena/)<br/>Automation integration: [AWS Athena](/docs/platform-services/automation-service/app-central/integrations/aws-athena/) |
36-
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-bedrock-logo.png')} alt="Thumbnail icon" width="50"/> | [Amazon Bedrock](https://aws.amazon.com/bedrock/) | App: [Amazon Bedrock](/docs/integrations/amazon-aws/amazon-bedrock/) |
36+
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-bedrock-logo.png')} alt="Thumbnail icon" width="50"/> | [Amazon Bedrock](https://aws.amazon.com/bedrock/) | Apps: <br/>- [Amazon Bedrock](/docs/integrations/amazon-aws/amazon-bedrock/) <br/>- [Amazon Bedrock AgentCore](/docs/integrations/amazon-aws/amazon-bedrock-agentcore) |
3737
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-chime-logo.png')} alt="Thumbnail icon" width="50"/> | [Amazon Chime](https://aws.amazon.com/chime/) | Apps: <br/>- [Amazon Chime](/docs/integrations/amazon-aws/amazon-chime/)<br/> - [Amazon Chime SDK](/docs/integrations/amazon-aws/amazon-chimesdk/) |
3838
| <img src={useBaseUrl('img/integrations/amazon-aws/cloudfront.png')} alt="Thumbnail icon" width="50"/> | [Amazon CloudFront](https://aws.amazon.com/cloudfront/) | App: [Amazon CloudFront](/docs/integrations/amazon-aws/cloudfront/) <br/>Automation integration: [AWS CloudFront](/docs/platform-services/automation-service/app-central/integrations/aws-cloudfront/) <br/>Cloud SIEM integration: [Amazon AWS - CloudFront](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/products/44f07c08-c2ad-4a95-a058-1d0737ff90db.md) <br/>Collector: [Amazon CloudFront Source](/docs/send-data/hosted-collectors/amazon-aws/amazon-cloudfront-source/) |
3939
| <img src={useBaseUrl('img/integrations/amazon-aws/amazon-cloudsearch-logo.png')} alt="Thumbnail icon" width="50"/> | [Amazon CloudSearch](https://aws.amazon.com/cloudsearch/) | App: [Amazon CloudSearch](/docs/integrations/amazon-aws/amazon-cloudsearch/) <br/>Community app: [Sumo Logic for Amazon CloudSearch](https://github.com/SumoLogic/sumologic-content/tree/master/Amazon_Web_Services/AWS_CloudSearch) |

0 commit comments

Comments
 (0)