You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Import and customize fluenbit add-on
* Enable fluent bit logs
* Bump helm addon version
* Dropping account id as it seems to create scraping errors
* Create separate log groups per namespace
* Apply pre-commit
* Remove conflicting global label
* Add config object for logs
* Enable logs in examples
* Add logs docs
* Fix broken link
* Add screenshots
* Update docs
* Typos
@@ -118,17 +124,30 @@ Check the the [complete example](./examples/existing-cluster-with-base-and-infra
118
124
119
125
## Motivation
120
126
121
-
Kubernetes is a powerful and extensible container orchestration technology that allows you to deploy and manage containerized applications at scale. The extensible nature of Kubernetes also allows you to use a wide range of popular open-source tools, commonly referred to as add-ons, in Kubernetes clusters. With such a large number of tools and design choices available, building a tailored EKS cluster that meets your application’s specific needs can take a significant amount of time. It involves integrating a wide range of open-source tools and AWS services and requires deep expertise in AWS and Kubernetes.
127
+
To gain deep visibility into your workloads and environments, AWS proposes a
128
+
set of secure, scalable, highly available, production-grade managed open
129
+
source services such as Amazon Managed Service for Prometheus, Amazon Managed
130
+
Grafana and Amazon OpenSearch.
131
+
132
+
AWS customers have asked for best-practices and guidance to collect metrics, logs
133
+
and traces from their containerized applications and microservices with ease of
134
+
deployment. Customers can use the AWS Observability Accelerator to configure their
135
+
metrics and traces collection, leveraging [AWS Distro for OpenTelemetry](https://aws-otel.github.io/),
136
+
to have opinionated dashboards and alerts available in only minutes.
122
137
123
-
AWS customers have asked for examples that demonstrate how to integrate the landscape of Kubernetes tools and make it easy for them to provision complete, opinionated EKS clusters that meet specific application requirements. Customers can use AWS Observability Accelerator to configure and deploy purpose built EKS clusters, and start onboarding workloads in days, rather than months.
124
138
125
139
## Support & Feedback
126
140
127
-
AWS Observability Accelerator for Terraform is maintained by AWS Solution Architects. It is not part of an AWS service and support is provided best-effort by the AWS Observability Accelerator community.
141
+
AWS Observability Accelerator for Terraform is maintained by AWS Solution
142
+
Architects. It is not part of an AWS service and support is provided best-effort
143
+
by the AWS Observability Accelerator community.
128
144
129
-
To post feedback, submit feature ideas, or report bugs, please use the [Issues](https://github.com/aws-observability/terraform-aws-observability-accelerator/issues) section of this GitHub repo.
145
+
To post feedback, submit feature ideas, or report bugs, please use the
If you are interested in contributing, see the [Contribution guide](https://github.com/aws-observability/terraform-aws-observability-accelerator/blob/main/CONTRIBUTING.md).
Copy file name to clipboardExpand all lines: docs/concepts.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,4 +123,6 @@ classDiagram
123
123
124
124
## Getting started with AWS Observability services
125
125
126
-
If you are new to AWS Observability services, or want to dive deeper into them, check our [One Observability Workshop](https://catalog.workshops.aws/observability/) for a hands-on experience in a self-paced environement or at an AWS venue.
126
+
If you are new to AWS Observability services, or want to dive deeper into them,
By default, we deploy a FluentBit daemon set in the cluster to collect worker
4
+
logs for all namespaces. Logs collection can be disabled with
5
+
`enable_logs = false`. Logs are collected and exported to Amazon CloudWatch Logs,
6
+
which enables you to centralize the logs from all of your systems, applications,
7
+
and AWS services that you use, in a single, highly scalable service.
8
+
9
+
Further configuration options are available in the [module documentation](https://github.com/aws-observability/terraform-aws-observability-accelerator/tree/main/modules/eks-monitoring#inputs).
10
+
This guide shows how you can leverage CloudWatch Logs in Amazon Managed Grafana
11
+
for your cluster and application logs.
12
+
13
+
## Using CloudWatch Logs as data source in Grafana
to enable Amazon CloudWatch as a data source. Make sure to provide permissions.
17
+
18
+
!!! tip
19
+
If you created your workspace with our [provided example](https://aws-observability.github.io/terraform-aws-observability-accelerator/helpers/managed-grafana/),
20
+
Amazon CloudWatch data source has already been setup for you.
21
+
22
+
All logs are delivered in the following CloudWatch Log groups naming pattern:
Copy file name to clipboardExpand all lines: modules/eks-monitoring/README.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,12 @@
2
2
3
3
This module provides EKS cluster monitoring with the following resources:
4
4
5
-
- AWS Distro For OpenTelemetry Operator and Collector
5
+
- AWS Distro For OpenTelemetry Operator and Collector for Metrics and Traces
6
+
- Logs with [AWS for FluentBit](https://github.com/aws/aws-for-fluent-bit)
6
7
- AWS Managed Grafana Dashboard and data source
7
8
- Alerts and recording rules with AWS Managed Service for Prometheus
8
9
9
-
This module is inspired from the open source [kube-prometheus-stack](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack)
10
+
This module makes use of the open source [kube-prometheus-stack](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack)
10
11
11
12
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
12
13
## Requirements
@@ -32,7 +33,8 @@ This module is inspired from the open source [kube-prometheus-stack](https://git
@@ -70,6 +72,7 @@ This module is inspired from the open source [kube-prometheus-stack](https://git
70
72
| <aname="input_enable_dashboards"></a> [enable\_dashboards](#input\_enable\_dashboards)| Enables or disables curated dashboards |`bool`|`true`| no |
71
73
| <aname="input_enable_java"></a> [enable\_java](#input\_enable\_java)| Enable Java workloads monitoring, alerting and default dashboards |`bool`|`false`| no |
72
74
| <aname="input_enable_kube_state_metrics"></a> [enable\_kube\_state\_metrics](#input\_enable\_kube\_state\_metrics)| Enables or disables Kube State metrics exporter. Disabling this might affect some data in the dashboards |`bool`|`true`| no |
75
+
| <aname="input_enable_logs"></a> [enable\_logs](#input\_enable\_logs)| Using AWS For FluentBit to collect cluster and application logs to Amazon CloudWatch |`bool`|`true`| no |
73
76
| <aname="input_enable_nginx"></a> [enable\_nginx](#input\_enable\_nginx)| Enable NGINX workloads monitoring, alerting and default dashboards |`bool`|`false`| no |
74
77
| <aname="input_enable_node_exporter"></a> [enable\_node\_exporter](#input\_enable\_node\_exporter)| Enables or disables Node exporter. Disabling this might affect some data in the dashboards |`bool`|`true`| no |
75
78
| <aname="input_enable_tracing"></a> [enable\_tracing](#input\_enable\_tracing)| (Experimental) Enables tracing with AWS X-Ray. This changes the deploy mode of the collector to daemon set. Requirement: adot add-on <= 0.58-build.0 |`bool`|`false`| no |
@@ -78,6 +81,7 @@ This module is inspired from the open source [kube-prometheus-stack](https://git
78
81
| <aname="input_irsa_iam_role_path"></a> [irsa\_iam\_role\_path](#input\_irsa\_iam\_role\_path)| IAM role path for IRSA roles |`string`|`"/"`| no |
0 commit comments