Skip to content

Commit 7dce67d

Browse files
Merge pull request #68125 from mletalie/OSDOCS-8735
[OSDOCS-8735][OSD] 'OSD Service Def > Logging' generalizes use of Amazon CloudWatch
2 parents d4cfc50 + 9d3bb45 commit 7dce67d

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

modules/log-forwarding-collector-outputs.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ The following collector outputs are supported:
1717
| Syslog RFC3164 | ✓ | ✓ (Logging 5.7+)
1818
| Syslog RFC5424 | ✓ | ✓ (Logging 5.7+)
1919
| Kafka | ✓ | ✓
20-
| Cloudwatch | ✓ | ✓
21-
| Cloudwatch STS | ✓ | ✓
20+
| Amazon Cloudwatch | ✓ | ✓
21+
| Amazon Cloudwatch STS| ✓ | ✓
2222
| Loki | ✓ | ✓
2323
| HTTP | ✓ | ✓ (Logging 5.7+)
2424
| Google Cloud Logging | ✓ | ✓

modules/logging-vector-fluentd-feature-comparison.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@
2626
| Feature | Fluentd | Vector
2727
| Elasticsearch certificates | ✓ | ✓
2828
| Elasticsearch username / password | ✓ | ✓
29-
| Cloudwatch keys | ✓ | ✓
30-
| Cloudwatch STS | ✓ | ✓
29+
| Amazon Cloudwatch keys | ✓ | ✓
30+
| Amazon Cloudwatch STS | ✓ | ✓
3131
| Kafka certificates | ✓ | ✓
3232
| Kafka username / password | ✓ | ✓
3333
| Kafka SASL | ✓ | ✓

modules/sdpolicy-logging.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@
44

55
[id="sdpolicy-logging_{context}"]
66
= Logging
7+
{product-title} provides optional integrated log forwarding to Amazon CloudWatch (on AWS) or Google Cloud Logging (on GCP).
78

8-
{product-title} provides optional integrated log forwarding to Amazon CloudWatch.
9+
For more information, see link:https://docs.openshift.com/dedicated/logging/log_collection_forwarding/log-forwarding.html[About log collection and forwarding].
910

1011
[id="audit-logging_{context}"]
1112
== Cluster audit logging
12-
Cluster audit logs are available through Amazon CloudWatch, if the integration is enabled. If the integration is not enabled, you can request the audit logs by opening a support case. Audit log requests must specify a date and time range not to exceed 21 days. When requesting audit logs, customers should be aware that audit logs are many GB per day in size.
13-
14-
13+
Cluster audit logs are available through Amazon CloudWatch (on AWS) or Google Cloud Logging (on GCP), if the integration is enabled. If the integration is not enabled, you can request the audit logs by opening a support case. Audit log requests must specify a date and time range not to exceed 21 days. When requesting audit logs, customers should be aware that audit logs are many GB per day in size.
1514
[id="application-logging_{context}"]
1615
== Application logging
17-
Application logs sent to `STDOUT` are collected by Fluentd and forwarded to Amazon CloudWatch through the cluster logging stack, if it is installed.
16+
Application logs sent to `STDOUT` are forwarded to Amazon CloudWatch (on AWS) or Google Cloud Logging (on GCP) through the cluster logging stack, if it is installed.
17+

0 commit comments

Comments
 (0)