Skip to content

Commit ae59b07

Browse files
author
kaiyan-sheng
committed
Merge remote-tracking branch 'upstream/master' into event_module
2 parents 89ccf65 + af9597a commit ae59b07

File tree

102 files changed

+3872
-3328
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

102 files changed

+3872
-3328
lines changed

‎packages/aws/_dev/build/docs/README.md‎

Lines changed: 0 additions & 161 deletions
Original file line numberDiff line numberDiff line change
@@ -95,164 +95,3 @@ In order to enable AWS integration, please make sure these permissions are given
9595
* sqs:ListQueues
9696
* sts:GetCallerIdentity
9797
* iam:ListAccountAliases
98-
99-
## Logs
100-
101-
### cloudtrail
102-
103-
The `cloudtrail` dataset collects the AWS CloudTrail logs. CloudTrail monitors
104-
events for the account. If user creates a trail, it delivers those events as log
105-
files to a specific Amazon S3 bucket. The `cloudtrail` dataset does not read
106-
the CloudTrail Digest files that are delivered to the S3 bucket when Log File
107-
Integrity is turned on, it only reads the CloudTrail logs.
108-
109-
{{fields "cloudtrail"}}
110-
111-
### cloudwatch
112-
113-
The `cloudwatch` dataset collects CloudWatch logs. Users can use Amazon
114-
CloudWatch logs to monitor, store, and access log files from different sources.
115-
Export logs from log groups to an Amazon S3 bucket which has SQS notification
116-
setup already.
117-
118-
{{fields "cloudwatch_logs"}}
119-
120-
### ec2
121-
122-
The `ec2` dataset is specifically for EC2 logs stored in AWS CloudWatch. Export logs
123-
from log groups to Amazon S3 bucket which has SQS notification setup already.
124-
With this dataset, EC2 logs will be parsed into fields like `ip_address`
125-
and `process.name`. For logs from other services, please use `cloudwatch` dataset.
126-
127-
{{fields "ec2_logs"}}
128-
129-
### elb
130-
131-
The `elb` dataset collects logs from AWS ELBs. Elastic Load Balancing provides
132-
access logs that capture detailed information about requests sent to the load
133-
balancer. Each log contains information such as the time the request was
134-
received, the client's IP address, latencies, request paths, and server
135-
responses. Users can use these access logs to analyze traffic patterns and to
136-
troubleshoot issues.
137-
138-
Please follow [enable access logs for classic load balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/enable-access-logs.html)
139-
for sending Classic ELB access logs to S3 bucket.
140-
For application load balancer, please follow [enable access log for application load balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-access-logs.html#enable-access-logging).
141-
For network load balancer, please follow [enable access log for network load balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest//network/load-balancer-access-logs.html).
142-
143-
{{fields "elb_logs"}}
144-
145-
### s3access
146-
147-
The `s3access` dataset collects server access logs from AWS S3. Server access
148-
logging provides detailed records for the requests that are made to a bucket.
149-
Server access logs are useful for many applications. For example, access log
150-
information can be useful in security and access audits. It can also help users
151-
to learn about customer base and understand Amazon S3 bill.
152-
153-
Please follow [how to enable server access logging](https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html#server-access-logging-overview)
154-
for sending server access logs to S3 bucket.
155-
156-
{{fields "s3access"}}
157-
158-
### vpcflow
159-
160-
{{fields "vpcflow"}}
161-
162-
## Metrics
163-
164-
### billing
165-
166-
{{event "billing"}}
167-
168-
{{fields "billing"}}
169-
170-
### cloudwatch
171-
172-
{{event "cloudwatch_metrics"}}
173-
174-
{{fields "cloudwatch_metrics"}}
175-
176-
### dynamodb
177-
178-
{{event "dynamodb"}}
179-
180-
{{fields "dynamodb"}}
181-
182-
### ebs
183-
184-
{{event "ebs"}}
185-
186-
{{fields "ebs"}}
187-
188-
### ec2
189-
190-
{{event "ec2_metrics"}}
191-
192-
{{fields "ec2_metrics"}}
193-
194-
### elb
195-
196-
{{event "elb_metrics"}}
197-
198-
{{fields "elb_metrics"}}
199-
200-
### lambda
201-
202-
{{event "lambda"}}
203-
204-
{{fields "lambda"}}
205-
206-
### natgateway
207-
208-
{{event "natgateway"}}
209-
210-
{{fields "natgateway"}}
211-
212-
### rds
213-
214-
{{event "rds"}}
215-
216-
{{fields "rds"}}
217-
218-
### s3_daily_storage
219-
220-
{{event "s3_daily_storage"}}
221-
222-
{{fields "s3_daily_storage"}}
223-
224-
### s3_request
225-
226-
{{event "s3_request"}}
227-
228-
{{fields "s3_request"}}
229-
230-
### sns
231-
232-
{{event "sns"}}
233-
234-
{{fields "sns"}}
235-
236-
### sqs
237-
238-
{{event "sqs"}}
239-
240-
{{fields "sqs"}}
241-
242-
### transitgateway
243-
244-
{{event "transitgateway"}}
245-
246-
{{fields "transitgateway"}}
247-
248-
### usage
249-
250-
{{event "usage"}}
251-
252-
{{fields "usage"}}
253-
254-
### vpn
255-
256-
{{event "vpn"}}
257-
258-
{{fields "vpn"}}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# billing
2+
3+
## Metrics
4+
5+
{{event "billing"}}
6+
7+
{{fields "billing"}}
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# cloudtrail
2+
3+
## Logs
4+
5+
The `cloudtrail` dataset collects the AWS CloudTrail logs. CloudTrail monitors
6+
events for the account. If user creates a trail, it delivers those events as log
7+
files to a specific Amazon S3 bucket. The `cloudtrail` dataset does not read
8+
the CloudTrail Digest files that are delivered to the S3 bucket when Log File
9+
Integrity is turned on, it only reads the CloudTrail logs.
10+
11+
{{fields "cloudtrail"}}
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# cloudwatch
2+
3+
## Logs
4+
5+
The `cloudwatch` dataset collects CloudWatch logs. Users can use Amazon
6+
CloudWatch logs to monitor, store, and access log files from different sources.
7+
Export logs from log groups to an Amazon S3 bucket which has SQS notification
8+
setup already.
9+
10+
{{fields "cloudwatch_logs"}}
11+
12+
## Metrics
13+
14+
{{event "cloudwatch_metrics"}}
15+
16+
{{fields "cloudwatch_metrics"}}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# dynamodb
2+
3+
## Metrics
4+
5+
{{event "dynamodb"}}
6+
7+
{{fields "dynamodb"}}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# ebs
2+
3+
## Metrics
4+
5+
{{event "ebs"}}
6+
7+
{{fields "ebs"}}
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
# ec2
2+
3+
## Logs
4+
5+
The `ec2` dataset is specifically for EC2 logs stored in AWS CloudWatch. Export logs
6+
from log groups to Amazon S3 bucket which has SQS notification setup already.
7+
With this dataset, EC2 logs will be parsed into fields like `ip_address`
8+
and `process.name`. For logs from other services, please use `cloudwatch` dataset.
9+
10+
{{fields "ec2_logs"}}
11+
12+
## Metrics
13+
14+
{{event "ec2_metrics"}}
15+
16+
{{fields "ec2_metrics"}}
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# elb
2+
3+
## Logs
4+
5+
The `elb` dataset collects logs from AWS ELBs. Elastic Load Balancing provides
6+
access logs that capture detailed information about requests sent to the load
7+
balancer. Each log contains information such as the time the request was
8+
received, the client's IP address, latencies, request paths, and server
9+
responses. Users can use these access logs to analyze traffic patterns and to
10+
troubleshoot issues.
11+
12+
Please follow [enable access logs for classic load balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/enable-access-logs.html)
13+
for sending Classic ELB access logs to S3 bucket.
14+
For application load balancer, please follow [enable access log for application load balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/load-balancer-access-logs.html#enable-access-logging).
15+
For network load balancer, please follow [enable access log for network load balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest//network/load-balancer-access-logs.html).
16+
17+
{{fields "elb_logs"}}
18+
19+
## Metrics
20+
21+
{{event "elb_metrics"}}
22+
23+
{{fields "elb_metrics"}}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# lambda
2+
3+
## Metrics
4+
5+
{{event "lambda"}}
6+
7+
{{fields "lambda"}}
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# natgateway
2+
3+
## Metrics
4+
5+
{{event "natgateway"}}
6+
7+
{{fields "natgateway"}}

0 commit comments

Comments
 (0)