diff --git a/src/content/docs/infrastructure/amazon-integrations/get-started/introduction-aws-integrations.mdx b/src/content/docs/infrastructure/amazon-integrations/get-started/introduction-aws-integrations.mdx index fef8386f225..cdda4aa77ef 100644 --- a/src/content/docs/infrastructure/amazon-integrations/get-started/introduction-aws-integrations.mdx +++ b/src/content/docs/infrastructure/amazon-integrations/get-started/introduction-aws-integrations.mdx @@ -23,11 +23,11 @@ redirects: freshnessValidatedDate: 2024-09-20 --- -New Relic offers several methods to collect performance data about your Amazon Web Services (AWS) environment. Once you've connected New Relic with AWS, you can access your system's AWS telemetry, letting you closely monitor the health of your AWS stack. This doc describes how to get started with AWS monitoring and provides an overview about AWS costs. +New Relic offers several methods to collect performance data about your Amazon Web Services (AWS) environment. After you've connected New Relic with AWS, you can access your system's AWS telemetry, letting you closely monitor the health of your AWS stack. Our AWS observability solution supports [Amazon CloudWatch Metric Streams integration](/docs/infrastructure/amazon-integrations/get-started/introduction-aws-integrations/#monitor-aws) to get metrics, and [Forward AWS service logs to New Relic](/install/aws-logs/) to get logs into New Relic. This document describes how to get started with AWS monitoring and provides an overview about AWS costs. ## Start with the CloudWatch Metric Streams integration [#monitor-aws] -Our AWS observability solution is the Amazon CloudWatch Metric Streams integration, which collects data about your entire AWS stack with [Amazon CloudWatch Metric Streams](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Metric-Streams.html). For the majority of use cases, you begin monitoring your AWS stack by [installing our Amazon CloudWatch Metric Streams integration](/install/aws-cloudwatch). +The Amazon CloudWatch Metric Streams integration collects data about your entire AWS stack with [Amazon CloudWatch Metric Streams](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Metric-Streams.html). For the majority of use cases, you begin monitoring your AWS stack by [installing our Amazon CloudWatch Metric Streams integration](/install/aws-cloudwatch). Our CloudWatch Metric Streams integration provides the best data about your AWS stack, but if you use [integrations not supported by CloudWatch Metric Streams](/docs/infrastructure/amazon-integrations/connect/connect-aws-new-relic-infrastructure-monitoring/#integrations-not-replaced-streams), you may need to use our legacy API polling solution. If you're currently using API polling for supported integrations, we recommend you [migrate your data to Amazon CloudWatch Metric Streams](/install/aws-cloudwatch/?task=migrate). diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/custom-attributes-not-appearing.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/custom-attributes-not-appearing.mdx new file mode 100644 index 00000000000..c9f6f388778 --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/custom-attributes-not-appearing.mdx @@ -0,0 +1,22 @@ +--- +title: Custom attributes not appearing in logs +type: troubleshooting +tags: + - Logs + - Log management + - Troubleshooting +metaDescription: 'Troubleshooting tips if the custom attributes not appearing in the logs.' +freshnessValidatedDate: never +--- + +## Problem + +Logs are not appearing in New Relic for a CloudWatch via Firehose integration setup. + +## Solution + +Possible reasons and their solutions: + +* For S3 via Lambda or CloudWatch via Lambda integrations, the `CUSTOM_META_DATA` environment variable may not be set, or it may not have a valid JSON value. Verify it. +* For CloudWatch via Firehose, the key-value pairs may not be set correctly. Ensure your key-value pairs are present under **Parameters**. +* Your key names may overlap with forbidden keywords. diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/log-forwarding-restrictions.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/log-forwarding-restrictions.mdx new file mode 100644 index 00000000000..21e0596f59f --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/log-forwarding-restrictions.mdx @@ -0,0 +1,24 @@ +--- +title: AWS Log forwarding restrictions +type: troubleshooting +tags: + - Logs + - Log management + - Log forwarding restrictions +metaDescription: 'Restrictions for log forwarding with New Relic.' +freshnessValidatedDate: never +--- + + + +New Relic has the following restrictions with AWS integration for log forwarding when ingesting logs via S3 or Firehose: + +### For ingesting AWS logs from S3 [#s3-restrictions] +* The log file size should be less that 80 MB. +* The size of a single log line should be less than 8 MB. +* Log lines between 1mb and 8mb will be split into multiple messages and forwarded to New Relic. +* New Relic currently doesn't support Client Json or log line parsing. +* New Relic currently supports only `Gzip` and `Bzip2` compression formats for log files. It processes files in other compressed formats as uncompressed files. +### For ingesting logs from CloudWatch [#cloudwatch-restrictions] +* New Relic currently doesn't support client Json or log line parsing. +* New Relic currently supports only [Lambda layers](https://github.com/newrelic/newrelic-lambda-layers) for parsing logic. \ No newline at end of file diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-firehose.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-firehose.mdx new file mode 100644 index 00000000000..03e37377891 --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-firehose.mdx @@ -0,0 +1,22 @@ +--- +title: Logs not appearing from CloudWatch via Firehose +type: troubleshooting +tags: + - Logs + - Log management + - Troubleshooting +metaDescription: 'Troubleshooting tips if the Logs are not appearing from CloudWatch via Firehose.' +freshnessValidatedDate: never +--- + +## Problem + +Logs are not appearing in New Relic for a CloudWatch via Firehose integration setup. + +## Solution + +Possible reasons and their solutions: + +* The API key may not be correct. Navigate to **Amazon Data Firehose > Firehose streams > your-stream > Edit destination settings**, and update the API key with the correct ingest license key. +* The provided endpoint may be wrong. Verify it. +* Check the S3 logs or Cloudwatch error logs. diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-lambda.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-lambda.mdx new file mode 100644 index 00000000000..c9e0cbd9e02 --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-lambda.mdx @@ -0,0 +1,26 @@ +--- +title: Logs not appearing from CloudWatch via Lambda +type: troubleshooting +tags: + - Logs + - Log management + - Troubleshooting +metaDescription: 'Troubleshooting tips if the Logs are not appearing from CloudWatch via Lambda.' +freshnessValidatedDate: never +--- + +## Problem + +Logs are not appearing in New Relic for a CloudWatch via Lambda integration setup. + +## Solution + +Possible reasons and their solutions: + +* The New Relic ingest license key may not be valid. In your AWS account, find the resource with Logical Id `NewRelicLogsLicenseKeySecret` from **CloudFormation stack > Resources**, and verify the key. +* To debug further, navigate to **CloudFormation Stack > Resources > NewRelicServerlessLogForwarder (Lambda Function) > Configuration > Environment Variables** and set the `DEBUG_MODE` parameter to true. Then, check the CloudWatch logs for the Lambda function to get the debug logs. +* The event may have been a genuine failure. To check, navigate to **CloudFormation Stack > Resources > NewRelicLogForwarderDLQ**, or search for your DLQ in AWS SQS, and examine the DLQ resource. +* The New Relic region and the ingest license key provided to the Lambda function or Firehose may not match. Verify and match it. + + For example, if the New Relic region is EU, provide a New Relic ingest license key from the EU region. +* The `NewRelicServerlessLogForwarder` may not have the CloudWatch trigger. Examine the output of the nested CloudFormation stacks. diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-s3-lambda.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-s3-lambda.mdx new file mode 100644 index 00000000000..5d154bcffb6 --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-s3-lambda.mdx @@ -0,0 +1,22 @@ +--- +title: Logs not appearing from S3 via Lambda +type: troubleshooting +tags: + - Logs + - Log management + - Troubleshooting +metaDescription: 'Troubleshooting tips if the Logs are not appearing from S3 via Lambda.' +freshnessValidatedDate: never +--- + +## Problem + +Logs are not appearing in New Relic for a S3 via Lambda integration setup. + +## Solution + +Possible reasons and their solutions: + +* Verify the possible reasons in [Logs not appearing from CloudWatch vai Lambda](/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-lambda). +* S3 files may not adhere to the [Log forwarding restrictions](/docs/logs/troubleshooting/aws-log-integration-issues/log-forwarding-restrictions) in New Relic. +* The `NewRelicServerlessLogForwarder` may not have the S3 trigger. Check the output of the nested CloudFormation stacks, and add it. diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/stack-creation-fails.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/stack-creation-fails.mdx new file mode 100644 index 00000000000..006dbf962b3 --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/stack-creation-fails.mdx @@ -0,0 +1,28 @@ +--- +title: Failing to create a Stack +type: troubleshooting +tags: + - Logs + - Log management + - Troubleshooting +metaDescription: 'Troubleshooting tips if the stack creation fails.' +freshnessValidatedDate: never +--- + +## Problem + +When creating a CloudFormation stack, it may fail due to various reasons. + +## Solution + +Possible reasons and their solutions: + +* The IAM role you have selected during the CloudFormation stack creation may not have sufficient [permissions](https://docs.aws.amazon.com/ARG/latest/userguide/gettingstarted-prereqs-permissions.html). +* If you have not select an IAM role, make sure your account not have the required [permissions](/docs/accounts/accounts-billing/new-relic-one-user-management/user-permissions/#logs). +* If the failure message appears as following, delete or rename the existing resources with that name, and retry. + + `Resource type {resource-name} with identifier {resource-identifier-name} already exists.` + +* Check the output of the nested CloudFormation stacks to identify potential errors. +* Ensure the selected S3 buckets don’t have event notifications on any object creation events. +* Ensure the selected CloudWatch log groups don’t have similar subscription filters. diff --git a/src/content/docs/logs/troubleshooting/aws-log-integration-issues/stack-deletion-fails.mdx b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/stack-deletion-fails.mdx new file mode 100644 index 00000000000..555ee9d27f1 --- /dev/null +++ b/src/content/docs/logs/troubleshooting/aws-log-integration-issues/stack-deletion-fails.mdx @@ -0,0 +1,20 @@ +--- +title: Failing to delete a Stack +type: troubleshooting +tags: + - Logs + - Log management + - Troubleshooting +metaDescription: 'Troubleshooting tips if the stack deletion fails.' +freshnessValidatedDate: never +--- + +## Problem + +When deleting a CloudFormation stack, it may fail due to various reasons. + +## Solution + +Possible reason and its solution: + +* If the S3 buckets created by the stack (e.g., for Firehose error logs) is not empty, then it cannot be deleted. archive the contents and then retry deleting the stack. diff --git a/src/install/aws-logs/aws_services/Install-aws-integration.mdx b/src/install/aws-logs/aws_services/Install-aws-integration.mdx new file mode 100644 index 00000000000..01e054c131f --- /dev/null +++ b/src/install/aws-logs/aws_services/Install-aws-integration.mdx @@ -0,0 +1,19 @@ +--- +headingText: Install the AWS integration for Logs forwarding +componentType: default +--- + +Forward your AWS logs into New Relic to gain enhanced visibility into system performance, enable early detection of issues, and make informed decisions. Our log management solution improves your team's operational efficiency while maintaining security and compliance. + + +Follow these steps to install the New Relic AWS integration and set up log forwarding from your AWS services. + +### Prerequisites [#prerequisites] +Before you begin, ensure you have the following: +* An AWS account with [permissions](https://docs.aws.amazon.com/ARG/latest/userguide/gettingstarted-prereqs-permissions.html) to deploy new AWS resources and [IAM roles](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html) +* A New Relic account with [permissions](/docs/accounts/accounts-billing/new-relic-one-user-management/user-permissions/#logs) to set up log forwarding +* A New Relic [license key](https://one.newrelic.com/api-keys) + + +If you are already using Lambda for S3 or CloudWatch, delete it or remove triggers from it manually. + diff --git a/src/install/aws-logs/aws_services/configure-log-forwarding.mdx b/src/install/aws-logs/aws_services/configure-log-forwarding.mdx new file mode 100644 index 00000000000..b6ef1b4279e --- /dev/null +++ b/src/install/aws-logs/aws_services/configure-log-forwarding.mdx @@ -0,0 +1,42 @@ +--- +headingText: Configure logs forwarding +componentType: default +--- + +In the **Configuration logs** page, choose a path for sending logs, set up integration for AWS sinks, verify the log endpoint, and add custom attributes to organize your logs. + + + +### Choose your log forwarding path [#choose-log-forwarding-path] +Following are the paths to forward AWS service logs to New Relic, suited to different needs. +* **Amazon Kinesis Data Firehose**: Ideal for direct and high-volume data streaming. +* **New Relic Lambda Function**: Provides high control over data transformation before forwarding. + +Depending upon your needs, choose log interation path(s): + * **S3 via Lambda** + * **CloudWatch via Firehose or Lambda > CloudWatch via Firehose** + * **CloudWatch via Firehose or Lambda > CloudWatch via Lambda** + +You can select both S3 via Lambda, and any one CloudWatch integration method together. + + +### Choose AWS sink [#choose-aws-sink] +You can use a CloudFormation template to set up log forwarding to New Relic for up to 40 buckets and/or log groups. +1. To send AWS service logs stored in S3 buckets using the New Relic Lambda function, specify the following details: + * **S3 bucket name**: S3 source bucket names + * **Prefix** (Optional) : Specify a source prefix within the S3 buckets +2. To send AWS service logs from CloudWatch log groups using the New Relic Lambda function or Firehose, specify the following details: + * **Log Group**: Source CloudWatch Log group names + * **Filter** (Optional): Specify a filter to refine logs within the CloudWatch Logs + + +### Set API endpoint for logs [#choose-api-endpoint] +The system sets the endpoint by default based on the region of your New Relic account. +* US account: `https://log-api.newrelic.com/log/v1` +* EU account: `https://log-api.eu.newrelic.com/log/v1` + + +### Add custom attributes [#add-custom-attributes] +Add custom attributes to organize your logs and make it easier to search, filter, analyze, and parse. After adding custom configurations, select **Continue**. + + \ No newline at end of file diff --git a/src/install/aws-logs/aws_services/deploy-cloudformation-stack.mdx b/src/install/aws-logs/aws_services/deploy-cloudformation-stack.mdx new file mode 100644 index 00000000000..47e125c1723 --- /dev/null +++ b/src/install/aws-logs/aws_services/deploy-cloudformation-stack.mdx @@ -0,0 +1,6 @@ +--- +headingText: Deploy CloudFormation stack +componentType: default +--- + +With a single deployment command from New Relic, a stack generates in AWS that groups log forwarding from multiple AWS resources. Multiple stacks may be generated depending on how you configure log and metric forwarding. diff --git a/src/install/aws-logs/aws_services/generate-cloudformation-template.mdx b/src/install/aws-logs/aws_services/generate-cloudformation-template.mdx new file mode 100644 index 00000000000..74ffdb90740 --- /dev/null +++ b/src/install/aws-logs/aws_services/generate-cloudformation-template.mdx @@ -0,0 +1,17 @@ +--- +headingText: Generate CloudFormation template +componentType: default +--- + +Generate a CloudDormation template that has all the configuration details you have entered so far. + +1. Provide a unique name for your CloudFormation stack. The default name is `NewRelic-AWS-Integration`. +2. Copy your existing license key. If you do not have a key, select **Create a new key** and copy it. +3. Select **Launch your Cloudformation in AWS**. AWS Cloud Console opens with the **Quick create stack** form. +4. The template includes all the parameters you have entered in New Relic. The following are the details you need to fill in: + * **New Relic Ingest License Key**: Paste the copied license key. + * **Store New Relic License Key in AWS Secrets Manager**: If you want to store the New Relic license key in AWS Secrets Manager as part of the Lambda environment variable, keep it **true** (default value). + * (Optional) In the **Permissions** block, select the IAM role for CloudFormation to use for all stack operations. + * Read through **Launch your Cloudformation in AWS** and acknowledge the necessary capabilities. +5. Select **Create stack**. It may take several minutes to create the new stack. +If it fails to create a stack, refer the [troubleshooing procedures](/docs/logs/troubleshooting/aws-log-integration-issues/stack-creation-fails). \ No newline at end of file diff --git a/src/install/aws-logs/aws_services/see-your-data.mdx b/src/install/aws-logs/aws_services/see-your-data.mdx new file mode 100644 index 00000000000..d010012356a --- /dev/null +++ b/src/install/aws-logs/aws_services/see-your-data.mdx @@ -0,0 +1,37 @@ +--- +headingText: See your data +componentType: default +--- +To complete the AWS account integration in New Relic, follow these steps: +1. Go back to the **Connect your AWS Account** page in the New Relic platform instance. +2. Provide the licence key: + * If you are using an existing license key, paste it in **License key** and continue. + * If you have created a new key, just select **Continue**. +9. Select **See your data**. + +If everything is configured correctly and your data is being collected, you should see log data in both of these places: + +* Our [logs UI](https://one.newrelic.com/launcher/logger.log-launcher) +* New Relic tools for running [NRQL queries](/docs/chart-builder/use-chart-builder/choose-data/use-advanced-nrql-mode-specify-data). +For example, you can run a query like this: + + S3 lambda / CloudWatch lambda: + ``` + SELECT * FROM Log WHERE instrumentation.provider = 'aws' AND instrumentation.name = 'lambda' + ``` + Cloudwatch firehose: + ``` + SELECT * FROM Log WHERE instrumentation.provider = 'aws' AND instrumentation.name = 'firehose' + ``` + +If no data appears after you enable the log management capabilities, or the custom attributes are not appearing in the log, refer to the following troubleshooing procedures: +* [Logs not appearing from CloudWatch via Firehose](/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-firehose) +* [Logs not appearing from CloudWatch via Lambda](/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-lambda) +* [Logs not appearing from S3 via Lambda](/docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-s3-lambda) +* [Custom attributes not appearing in logs](/docs/logs/troubleshooting/aws-log-integration-issues/custom-attributes-not-appearing) +* [Failing to delete a Stack](/docs/logs/troubleshooting/aws-log-integration-issues/stack-deletion-fails) +* [Log forwarding restrictions](/docs/logs/troubleshooting/aws-log-integration-issues/log-forwarding-restrictions) + +### Disable log forwarding [#disable] + +To disable log forwarding capabilities, follow standard procedures in [Amazon CloudWatch documentation](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html). You do not need to do anything else in New Relic. diff --git a/src/install/aws-logs/aws_services/set-up-aws-integration-with-log-forwarding.mdx b/src/install/aws-logs/aws_services/set-up-aws-integration-with-log-forwarding.mdx new file mode 100644 index 00000000000..993c49a6a37 --- /dev/null +++ b/src/install/aws-logs/aws_services/set-up-aws-integration-with-log-forwarding.mdx @@ -0,0 +1,15 @@ +--- +headingText: Set up your AWS integration with log forwarding +componentType: default +--- + +Set up an AWS integration with a CloudFormation template via New Relic and specify the data type you want to send to New Relic. You can set up the integration for forwarding both logs and metrics using a single CloudFormation template. +1. Log in to [New Relic](https://one.newrelic.com/). +2. Navigate to **+ Integrations & Agents**. +3. Search and select **Integrate your AWS account** from the **All** tab. +4. From the **Select an account** page, select your New Relic account and continue. +5. From the **Choose data type(s)** page, select **Logs** and continue. + +To set up integration for forwarding metrics data, refer [Amazon CloudWatch Metric Streams](/install/aws-cloudwatch/). + +6. From the **Choose a setup method** page, Select **Automate AWS with CloudFoundation** and continue. This is the only setup method available for log integration. \ No newline at end of file diff --git a/src/install/config/aws-logs.yaml b/src/install/config/aws-logs.yaml index b94aaa8d6aa..5a2ca8e53ad 100644 --- a/src/install/config/aws-logs.yaml +++ b/src/install/config/aws-logs.yaml @@ -1,6 +1,6 @@ agentName: aws-logs agentType: integration -title: 'Forward AWS logs' +title: 'Forward AWS services logs to New Relic' metaDescription: 'Forward logs from AWS' introFilePath: 'src/install/aws-logs/intro.mdx' redirects: @@ -21,15 +21,17 @@ appInfo: placeholder: 'What type of AWS service are you forwarding logs from?' options: - value: 'EC2' - displayName: 'Amazon EC2' + displayName: 'Hosts (Amazon EC2)' - value: 'EKS' - displayName: 'Amazon EKS' + displayName: 'Kubernetes (Amazon EKS)' - value: 'ECS' - displayName: 'Amazon ECS' - - value: 'security_lake' - displayName: 'Amazon route 53 logs / VPC Flow logs / AWS Cloudtrail logs/ AWS Security Hub' - - value: 'other' - displayName: 'Other log types' + displayName: 'Containers (Amazon ECS)' + # - value: 'security_lake' + # displayName: 'Amazon route 53 logs / VPC Flow logs / AWS Cloudtrail logs/ AWS Security Hub' + # - value: 'other' + # displayName: 'Other log types' + - value: 'aws_services' + displayName: 'All other AWS services' - optionType: forward_EC2 label: '' placeholder: 'How would you like to forward your EC2 logs?' @@ -58,14 +60,14 @@ appInfo: displayName: 'Cloudwatch Lambda Function' - value: 'sidecar_firelens' displayName: 'Sidecar container with Firelens' - - optionType: forward_Other - label: '' - placeholder: 'Select logs destination:' - options: - - value: 'data_firehose' - displayName: 'Kinesis Data Firehose' - - value: 'cloud_lambda' - displayName: 'Cloudwatch Lambda Function' + # - optionType: forward_Other + # label: '' + # placeholder: 'Select logs destination:' + # options: + # - value: 'data_firehose' + # displayName: 'Kinesis Data Firehose' + # - value: 'cloud_lambda' + # displayName: 'Cloudwatch Lambda Function' steps: - filePath: 'src/install/aws-logs/appInfo_service.mdx' - filePath: 'src/install/aws-logs/appInfo_EC2.mdx' @@ -103,6 +105,48 @@ steps: - optionType: service options: - value: 'security_lake' + - filePath: 'src/install/aws-logs/aws_services/Install-aws-integration.mdx' + overrides: + - isConditionalStep: true + selectedOptions: + - optionType: service + options: + - value: 'aws_services' + - filePath: 'src/install/aws-logs/aws_services/set-up-aws-integration-with-log-forwarding.mdx' + overrides: + - isConditionalStep: true + selectedOptions: + - optionType: service + options: + - value: 'aws_services' + - filePath: 'src/install/aws-logs/aws_services/configure-log-forwarding.mdx' + overrides: + - isConditionalStep: true + selectedOptions: + - optionType: service + options: + - value: 'aws_services' + - filePath: 'src/install/aws-logs/aws_services/generate-cloudformation-template.mdx' + overrides: + - isConditionalStep: true + selectedOptions: + - optionType: service + options: + - value: 'aws_services' + - filePath: 'src/install/aws-logs/aws_services/deploy-cloudformation-stack.mdx' + overrides: + - isConditionalStep: true + selectedOptions: + - optionType: service + options: + - value: 'aws_services' + - filePath: 'src/install/aws-logs/aws_services/see-your-data.mdx' + overrides: + - isConditionalStep: true + selectedOptions: + - optionType: service + options: + - value: 'aws_services' - filePath: 'src/install/aws-logs/agent/basic-agent.mdx' overrides: - isConditionalStep: true @@ -274,4 +318,5 @@ steps: - optionType: forward_ECS options: - value: 'sidecar_firelens' -whatsNextFilePath: 'src/install/aws-logs/whatsNext.mdx' \ No newline at end of file +# filePath: 'src/install/aws-logs/aws_services/log-forwarding-restrictions.mdx' +whatsNextFilePath: 'src/install/aws-logs/whatsNext.mdx' \ No newline at end of file diff --git a/src/nav/logs.yml b/src/nav/logs.yml index ff44a133533..c39bdb095f7 100644 --- a/src/nav/logs.yml +++ b/src/nav/logs.yml @@ -22,8 +22,8 @@ pages: path: /docs/logs/forward-logs/enable-log-management-new-relic - title: Infrastructure agent logs path: /docs/logs/forward-logs/forward-your-logs-using-infrastructure-agent - - title: AWS services - path: /install/aws-logs + - title: Forward AWS service logs to New Relic + path: /install/aws-logs - title: Akamai path: /docs/logs/forward-logs/enable-log-management-new-relic#forward-other - title: AWS Lambda for Amazon S3 @@ -134,3 +134,17 @@ pages: path: /docs/logs/troubleshooting/log-message-truncated - title: Show surrounding logs path: /docs/logs/troubleshooting/find-issues-cause-or-impact-surrounding-logs + - title: Failing to create a Stack + path: /docs/logs/troubleshooting/aws-log-integration-issues/stack-creation-fails + - title: Logs not appearing from CloudWatch via Lambda + path: /docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-lambda + - title: Logs not appearing from CloudWatch via Firehose + path: /docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-cloudwatch-firehose + - title: Logs not appearing from S3 via Lambda + path: /docs/logs/troubleshooting/aws-log-integration-issues/logs-not-appearing-from-s3-lambda + - title: Custom attributes not appearing in logs + path: /docs/logs/troubleshooting/aws-log-integration-issues/custom-attributes-not-appearing + - title: Failing to delete a Stack + path: /docs/logs/troubleshooting/aws-log-integration-issues/stack-deletion-fails + - title: Log forwarding limitations + path: /docs/logs/troubleshooting/aws-log-integration-issues/log-forwarding-restrictions \ No newline at end of file