AWS Elastic Beanstalk: Add custom logs to CloudWatch?

后端 未结 4 460
心在旅途
心在旅途 2020-12-23 22:17

How to add custom logs to CloudWatch? Defaults logs are sent but how to add a custom one?

I already added a file like this: (in .ebextensions)

files         


        
相关标签:
4条回答
  • 2020-12-23 22:49

    The awslogs agent looks in the configuration file for the log files which it's supposed to send. There are some defaults in it. You need to edit it and specify the files.

    You can check and edit the configuration file located at:

    /etc/awslogs/awslogs.conf
    

    Make sure to restart the service:

    sudo service awslogs restart
    

    You can specify your own files there and create different groups and what not.

    Please refer to the following link and you'll be able to get your logs in no time.

    Resources:

    https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AgentReference.html

    Edit:

    As you don't want to edit the files on the instance, you can add the relevant code to the .ebextensions folder in the root of your code. For example, this is my 01_cloudwatch.config :

    packages:
      yum:
        awslogs: []
    
    container_commands:
      01_get_awscli_conf_file:
        command: "aws s3 cp s3://project/awscli.conf /etc/awslogs/awscli.conf"
      02_get_awslogs_conf_file:
        command: "aws s3 cp s3://project/awslogs.conf.${NODE_ENV} /etc/awslogs/awslogs.conf"
      03_restart_awslogs:
        command: "sudo service awslogs restart"
      04_start_awslogs_at_system_boot:
        command: "sudo chkconfig awslogs on"
    

    In this config, I am fetching the appropriate config file from a S3 bucket depending on the NODE_ENV. You can do anything you want in your config.

    0 讨论(0)
  • 2020-12-23 22:54

    Looking at the AWS docs it's not immediately apparent, but there are a few things you need to do.

    (Our environment is an Amazon Linux AMI - Rails App on the Ruby 2.6 Puma Platform).

    First, create a Policy in IAM to give your EB generated EC2 instances access to work with CloudWatch log groups and stream to them - we named ours "EB-Cloudwatch-LogStream-Access".

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": [
                    "logs:CreateLogStream",
                    "logs:DescribeLogStreams",
                    "logs:CreateLogGroup",
                    "logs:PutLogEvents"
                ],
                "Resource": "arn:aws:logs:*:*:log-group:/aws/elasticbeanstalk/*:log-stream:*"
            }
        ]
    }
    

    Once you have created this, make sure the policy is attached (in IAM > Roles) to your IAM Instance Profile and Service Role that are associated with your EB environment (check the environment's configuration page: Configuration > Security > IAM instance profile | Service Role).

    Then, provide a .config file in your .ebextensions directory such as setup_stream_to_cloudwatch.config or 0x_setup_stream_to_cloudwatch.config. In our project we have made it the last extension .config file to run during our deploys by setting a high number for 0x (eg. 09_setup_stream_to_cloudwatch.config).

    Then, provide the following, replacing your_log_file with the appropriate filename, keeping in mind that some log files live in /var/log on an Amazon Linux AMI and some (such as those generated by your application) may live in a path such as /var/app/current/log:

    files:
      '/etc/awslogs/config/logs.conf':
        mode: '000600'
        owner: root
        group: root
        content: |
          [/var/app/current/log/your_log_file.log]
          log_group_name = `{"Fn::Join":["/", ["/aws/elasticbeanstalk", { "Ref":"AWSEBEnvironmentName" }, "var/app/current/log/your_log_file.log"]]}`
          log_stream_name = {instance_id}
          file = /var/app/current/log/your_log_file.log*
    commands:
      "01":
        command: chkconfig awslogs on
      "02":
        command: service awslogs restart # note that this works for Amazon Linux AMI only - other Linux instances likely use `systemd`
    

    Deploy your application, and you should be set!

    0 讨论(0)
  • 2020-12-23 22:55

    Credits where due go to Sebastian Hsu and Abhyudit Jain.

    This is the final config file I came up with for .ebextensions for our particular use case. Notes explaining some aspects are below the code block.

    files:
      "/etc/awslogs/config/beanstalklogs_custom.conf" :
        mode: "000600"
        owner: root
        group: root
        content: |
          [/var/log/tomcat8/catalina.out]
          log_group_name = `{"Fn::Join":["/", ["/aws/elasticbeanstalk", { "Fn::Select" : [ "1", { "Fn::Split" : [ "-", { "Ref":"AWSEBEnvironmentName" } ] } ] }, "var/log/tomcat8/catalina.out"]]}`
          log_stream_name = `{"Fn::Join":["--", [{ "Ref":"AWSEBEnvironmentName" }, "{instance_id}"]]}`
          file = /var/log/tomcat8/catalina.out*
    
    services:
      sysvinit:
        awslogs:
          files:
            - "/etc/awslogs/config/beanstalklogs_custom.conf"
    
    commands:
      rm_beanstalklogs_custom_bak:
        command: "rm beanstalklogs_custom.conf.bak"
        cwd: "/etc/awslogs/config"
        ignoreErrors: true
    

    log_group_name

    We have a standard naming scheme for our EB environments which is exactly environmentName-environmentType. I'm using { "Fn::Split" : [ "-", { "Ref":"AWSEBEnvironmentName" } ] } to split that into an array of two strings (name and type).

    Then I use { "Fn::Select" : [ "1", <<SPLIT_OUTPUT>> ] } to get just the type string. Your needs would obviously differ, so you may only need the following:

          log_group_name = `{"Fn::Join":["/", ["/aws/elasticbeanstalk", { "Ref":"AWSEBEnvironmentName" }, "var/log/tomcat8/catalina.out"]]}`
    

    log_stream_name

    I'm using the Fn::Join function to join the EB environment name with the instance ID. Note that the instance ID template is a string that gets echoed exactly as given.

    services

    The awslogs service is restarted automatically when the custom conf file is deployed.

    commands

    When the files block overwrites an existing file, it creates a backup file, like beanstalklogs_custom.conf.bak. This block erases that backup file because awslogs service reads both files, potentially causing conflict.

    Result

    If you log in to an EC2 instance and sudo cat the file, you should see something like this. Note that all the Fn functions have resolved. If you find that an Fn function didn't resolve, check it for syntax errors.

    [/var/log/tomcat8/catalina.out]
    log_group_name = /aws/elasticbeanstalk/environmentType/var/log/tomcat8/catalina.out
    log_stream_name = environmentName-environmentType--{instance_id}
    file = /var/log/tomcat8/catalina.out*
    
    0 讨论(0)
  • 2020-12-23 22:56

    Both bundlelogs.d and taillogs.d are logs retrieved from management console. What you want to do is extend default logs (e.g. eb-activity.log) to CloudWatch Logs. In order to extend the log stream, you need to add another configuration under /etc/awslogs/config/. The configuration should follow the Agent Configuration file Format.

    I've successfully extended my logs for my custom ubuntu/nginx/php platform. Here is my extension file FYI. Here is an official sample FYI.

    In your case, it could be like

    files:
      "/etc/awslogs/config/my_app_log.conf" :
        mode: "000600"
        owner: root
        group: root
        content: |
          [/var/app/current/logs/xxx.log]
          log_group_name = `{"Fn::Join":["/", ["/aws/elasticbeanstalk", { "Ref":"AWSEBEnvironmentName" }, "var/app/current/logs/xxx.log"]]}`
          log_stream_name = {instance_id}
          file = /var/app/current/logs/xxx.log*
    
    0 讨论(0)
提交回复
热议问题