You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/reference/edot-cloud-forwarder/aws.md
+26-9Lines changed: 26 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ products:
17
17
18
18
# EDOT Cloud Forwarder for AWS
19
19
20
-
{{edot-cf}} (CF) for AWS provides the EDOT Collector as a Lambda function that collects and forwards logs to {{product.observability}} on {{serverless-full}}.
20
+
{{edot-cf}} (CF) for AWS provides the EDOT Collector as a Lambda function that collects and forwards logs to {{motlp}}.
21
21
22
22
{{edot-cf}} for AWS supports the following log sources:
23
23
@@ -104,9 +104,7 @@ Trim the API key from `Authorization=ApiKey MYKEYVALUE...` to just `MYKEYVALUE..
104
104
| --- | --- |
105
105
| CloudFormation (AWS CLI) | Deploy using AWS CLI commands with CloudFormation templates. |
106
106
| CloudFormation (AWS Console) | Deploy using the AWS Management Console UI. |
107
-
<!-- Not Public yet
108
-
| **AWS Serverless Application Repository (SAR)** | Deploy directly from the AWS Serverless Application Repository. |
109
-
-->
107
+
| AWS Serverless Application Repository (SAR) | Deploy directly from the AWS Serverless Application Repository. |
110
108
111
109
Each method achieves the same result and uses CloudFormation templates. Choose the method that best adapts to your workflow.
112
110
@@ -199,6 +197,27 @@ The default values provided have been determined through extensive load testing
199
197
Adjust these parameters only if you notice performance issues such as Lambda timeouts, throttling, high memory usage or dropped data. If you need assistance tuning these parameters for your specific workload, refer to [Contact support](docs-content://troubleshoot/ingest/opentelemetry/contact-support.md).
200
198
:::
201
199
200
+
## Sizing and performance tuning
201
+
202
+
Use the following sizing matrices to select appropriate Lambda memory and concurrency settings for your traffic volume. Proper tuning helps maximize performance and prevent throttling in high‑volume log sources.
Use the AWS CLI to deploy the EDOT Cloud Forwarder with CloudFormation templates. This method is ideal for automation and infrastructure-as-code workflows.
@@ -462,7 +481,6 @@ To modify parameters of an existing stack through the AWS Console:
462
481
7. Select **Submit** to apply the updates. In case of a change set, **Execute changeset** .
463
482
8. Monitor the stack update progress in the console.
464
483
465
-
<!-- Not public yet
466
484
## Deploy using AWS Serverless Application Repository
467
485
468
486
In addition to deploying through CloudFormation templates, you can deploy the EDOT Cloud Forwarder application directly from the AWS Serverless Application Repository (SAR).
@@ -472,9 +490,9 @@ In addition to deploying through CloudFormation templates, you can deploy the ED
472
490
To deploy from SAR, follow these steps:
473
491
474
492
1. Navigate to **AWS Serverless Application Repository** in the AWS Management Console.
475
-
2. Search for `edot-cloud-forwarder-s3-logs` and select the application.
476
-
3. Select **Deploy**.
477
-
4. **Configure the application settings**: You will be prompted to fill in the same parameters described in the [Configure the template](#configure-the-template) section. Refer to that section for details on each parameter.
493
+
2.Select **Available applications** and check the box **Show apps that create custom IAM roles or resource policies**.
494
+
3.Search for `edot-cloud-forwarder-s3-logs` and select the application.
495
+
4.**Configure the application settings**: Under **Application settings**, fill in the parameters described in the [Configure the template](#configure-the-template) section. Refer to that section for details on each parameter.
478
496
5.**Acknowledge IAM role creation**: At the bottom of the page, check the box to acknowledge that the application will create custom IAM roles. This is required for the forwarder to access your S3 bucket and send data to Elastic Observability.
479
497
6. Select **Deploy**.
480
498
@@ -483,7 +501,6 @@ The deployment process will start, and a CloudFormation stack will be created wi
483
501
:::{note}
484
502
The same [deployment considerations](#deployment-considerations) apply to SAR deployments, including the requirement to deploy separate serverless applications for each log type and ensure the deployment region matches your S3 bucket region.
0 commit comments