EDOT Cloud Forwarder for AWS
Serverless Observability EDOT CF AWS
EDOT Cloud Forwarder (CF) for AWS provides the EDOT Collector as a Lambda function that collects and forwards logs to Elastic Observability on Elastic Cloud Serverless.
EDOT Cloud Forwarder for AWS supports the following log sources:
| AWS Service | Telemetry Description |
|---|---|
| Virtual Private Cloud (VPC) | VPC Flow Logs to capture information about IP traffic |
| Elastic Load Balancer (ELB) | Access logs for your Application Load Balancer |
Read on to learn how to set up EDOT Cloud Forwarder for AWS.
We are working to support other popular log types and sources. Get in touch to let us know of any specific requirements that could influence our plans.
EDOT Cloud Forwarder for AWS requires a Managed OTLP endpoint and an API key. Managed OTLP is available for Elastic Cloud Serverless and will soon be available for Elastic Cloud Hosted.
For self-managed deployments, set up an EDOT Collector in Gateway mode that ingests OTel data from the edge setup into the self-managed Elastic Stack.
To collect logs using EDOT Cloud Forwarder for AWS, you need:
To collect VPC Flow logs, you need:
- A Virtual Private Cloud (VPC)
- An S3 bucket for storing flow logs
- A flow log configured with the S3 bucket as the destination
To collect Elastic Load Balancer (ELB) Access logs, you need:
- An ELB of any type (ALB, NLB, CLB)
- An S3 bucket to store the access logs
- Access logging enabled, with the bucket as the destination
In addition, you need to know the URL of the managed OTLP endpoint and the API key for authentication.
Steps to retrieve the OTLP endpoint and API key
Follow these steps to retrieve the managed OTLP endpoint URL for your Serverless project:
- In Elastic Cloud Serverless, open your Observability project.
- Go to Add data → Application → OpenTelemetry.
- Select Managed OTLP Endpoint in the second step.
- Copy the OTLP endpoint configuration value.
- Select Create API Key to generate an API key.
In the CloudFormation templates, the OTLP endpoint is set as OTLPEndpoint, and the API key is set as ElasticAPIKey.
Trim the API key from Authorization=ApiKey MYKEYVALUE... to just MYKEYVALUE... before using it as the argument to the ElasticAPIKey parameter.
Before deploying EDOT Cloud Forwarder for AWS, keep these points in mind:
- Deploy a separate CloudFormation stack for each log type, for example VPC Flow Logs or ELB Access Logs. Each CloudFormation stack can only process one log type and format at a time.
- Logs stored in S3 must be placed in separate buckets. Each log type should reside in its own dedicated bucket.
- The CloudFormation stack deployment region must match the region of the S3 bucket.
Download the CloudFormation template to deploy the appropriate stack based on your log source:
| Log Source | CloudFormation template |
|---|---|
| S3 logs | https://edot-cloud-forwarder.s3.amazonaws.com/v0/latest/cloudformation/s3_logs-cloudformation.yaml |
For specific versions, edit latest in the URL to the required version in the format vX.Y.Z.
EDOT Cloud Forwarder for AWS uses a CloudFormation template to deploy the EDOT Collector as a Lambda function.
These are the required settings you need:
| Setting | Description |
|---|---|
region |
AWS region where the CloudFormation stack is to be deployed |
stack-name |
Name of the CloudFormation stack, for example, vpc-edot-cfDo not use the same name for different sources. |
OTLPEndpoint |
The OTLP endpoint URL used for data ingestion |
ElasticApiKey |
API key for authentication with Elastic |
Set the following settings based on the log source:
For S3 logs, use the following settings:
| Setting | Description |
|---|---|
EdotCloudForwarderS3LogsType |
The encoding format for logs in the S3 bucket. Supported options: - vpcflow: VPC Flow Logs- elbaccess: ELB Access logs |
SourceS3BucketARN |
Amazon Resource Name (ARN) of the S3 bucket where logs are stored. This bucket will trigger the edot-cloud-forwarder Lambda function automatically. |
These are optional settings you can set in the CloudFormation template:
| Setting | Description |
|---|---|
EdotCloudForwarderTimeout |
Maximum execution time for the Lambda function, measured in seconds. Default value is 300 seconds. Minimum value is 1 second. Maximum value is 900 seconds. |
EdotCloudForwarderVersion |
Version of the EDOT Cloud Forwarder. Expected format is semantic versioning, for example 0.2.4. Defaults to the latest available patch version. Don't change this value unless advised by Elastic Support. |
EdotCloudForwarderMemorySize |
Set the allocated memory for the Lambda function, measured in megabytes. Default value is 512 MB. Minimum value is 128 MB. Maximum value is 10240 MB. |
EdotCloudForwarderConcurrentExecutions |
Set the maximum number of reserved concurrent executions for the Lambda function. Default value is 5. Make sure this value doesn't exceed your AWS account's concurrency limit. |
EdotCloudForwarderExporterMaxQueueSize |
Set the internal OTLP exporter queue size. Default is 50 MB. You may incease this based on the data volume. |
Default values of EdotCloudForwarderMemorySize and EdotCloudForwarderConcurrentExecutions are sufficient for most use cases. Key indications for the need of tuning these parameters are Lambda throttling and Lambda timeouts. Along with these, you might also need to adjust EdotCloudForwarderExporterMaxQueueSize to export higher data volumes.
The following examples show how to deploy the ECF Cloud Forwarder using AWS CloudFormation. Copy and paste these commands after replacing the placeholder values with your actual configuration.
- Use the
--template-urlflag to reference a template hosted on S3. - To always use the most recent stable templates, use the
latestpath. For example,v0/latest. - To pin a specific version, replace
latestwith the desired version tag. For example,v0/v{{version.edot-cf-aws}}.
Alternatively, if you have downloaded the template file, use the --template-body file://<path> option with a local template file.
This example deploys a CloudFormation stack to collect VPC Flow logs stored in an S3 bucket.
aws cloudformation create-stack \
--stack-name edot-cloud-forwarder-vpc \
--template-url https://edot-cloud-forwarder.s3.amazonaws.com/v0/latest/cloudformation/s3_logs-cloudformation.yaml \
--capabilities CAPABILITY_NAMED_IAM \
--region eu-central-1 \
--parameters \
ParameterKey=SourceS3BucketARN,ParameterValue=your-s3-vpc-bucket-arn \
ParameterKey=OTLPEndpoint,ParameterValue="<placeholder>" \
ParameterKey=ElasticAPIKey,ParameterValue="<placeholder>" \
ParameterKey=EdotCloudForwarderS3LogsType,ParameterValue="vpcflow"
This example deploys a CloudFormation stack to collect ALB Access logs stored in an S3 bucket.
aws cloudformation create-stack \
--stack-name edot-cloud-forwarder-alb \
--template-url https://edot-cloud-forwarder.s3.amazonaws.com/v0/latest/cloudformation/s3_logs-cloudformation.yaml \
--capabilities CAPABILITY_NAMED_IAM \
--region eu-central-1 \
--parameters \
ParameterKey=SourceS3BucketARN,ParameterValue=your-s3-alb-bucket-arn \
ParameterKey=OTLPEndpoint,ParameterValue="<placeholder>" \
ParameterKey=ElasticAPIKey,ParameterValue="<placeholder>" \
ParameterKey=EdotCloudForwarderS3LogsType,ParameterValue="elbaccess"
The --capabilities CAPABILITY_NAMED_IAM flag is required because this CloudFormation template creates AWS Identity and Access Management (IAM) resources. More specifically, it creates a named IAM role (LambdaExecutionRole) for the Lambda function. To acknowledge that AWS CloudFormation might create or modify IAM resources with custom names, you must specify the CAPABILITY_NAMED_IAM capability.
To update an existing CloudFormation stack while preserving some parameter values, follow these steps:
-
Identify the stack to update
Determine the name of the CloudFormation stack you want to modify.
-
Prepare the update command
Use the following structure for your update command:
- Include all required parameters.
- Use
UsePreviousValue=truefor parameters that should remain unchanged. - Specify
ParameterValue=<new-value>for parameters that need to be updated.
-
Run the
update-stackcommandRun the command with the following parameters:
aws cloudformation update-stack \ --template-url https://edot-cloud-forwarder.s3.amazonaws.com/v0/latest/cloudformation/<template-file-name>.yaml \ --stack-name <stack-name> \ --capabilities CAPABILITY_NAMED_IAM \ --region eu-central-1 \ --parameters \ ParameterKey=Param1,UsePreviousValue=true \ ParameterKey=Param2,UsePreviousValue=true \ ParameterKey=Param3,UsePreviousValue=true \ ParameterKey=Param4,ParameterValue=<new-value>Example using S3 logs templateFor example, to modify the S3 bucket ARN for the
edot-cloud-forwarder-vpcstack while keeping other parameter values unchanged:aws cloudformation update-stack \ --template-url https://edot-cloud-forwarder.s3.amazonaws.com/v0/latest/cloudformation/s3_logs-cloudformation.yaml \ --stack-name edot-cloud-forwarder-vpc \ --capabilities CAPABILITY_NAMED_IAM \ --region eu-central-1 \ --parameters \ ParameterKey=OTLPEndpoint,UsePreviousValue=true \ ParameterKey=ElasticAPIKey,UsePreviousValue=true \ ParameterKey=EdotCloudForwarderS3LogsType,UsePreviousValue=true \ ParameterKey=SourceS3BucketARN,ParameterValue=your-new-s3-vpc-bucket-arn -
Verify the update
After running the command, check the stack status in the AWS Management Console under CloudFormation → Stacks. Then, run this command to confirm the updated parameter values:
aws cloudformation describe-stacks --stack-name <stack-name>
You can deploy the stack manually using the AWS Management Console by following these steps:
- Navigate to CloudFormation in the AWS Console.
- Select Create Stack and choose With new resources (standard) to start a fresh deployment.
- Select one of the following options under Specify template:
- Amazon S3 URL (Recommended): Use the pre-hosted CloudFormation template stored in the public S3 bucket.
- Upload a template file: Download the template from the S3 bucket and upload it manually.
- Select Next and configure all required parameters.
- Select Next again and check Acknowledge IAM capabilities. This is required because the template creates named IAM roles with permissions to access the required resources.
- Review your configuration and select Submit to deploy the stack.
- Monitor the progress until the stack reaches the
CREATE_COMPLETEstate.
The CloudFormation templates create a number of resources to process logs from a specific log source.
This is a list of resources created by the stack when processing S3 logs.
| Resource name | Type | Description |
|---|---|---|
CustomNotificationUpdater |
AWS::CloudFormation::CustomResource |
Custom resource used to manage S3 event notifications dynamically. |
LambdaExecutionRole |
AWS::IAM::Role |
IAM role granting permissions needed for the Lambda function to interact with S3 and other AWS services. |
LambdaFunction |
AWS::Lambda::Function |
Core Lambda function responsible for processing incoming logs from S3. This is a key resource in the stack. |
LambdaInvokeConfig |
AWS::Lambda::EventInvokeConfig |
Configures error handling and invocation settings for the Lambda function. |
LambdaLogGroup |
AWS::Logs::LogGroup |
CloudWatch log group storing logs for the main Lambda function. Useful for debugging and monitoring. |
LambdaPermissionS3Bucket |
AWS::Lambda::Permission |
Grants permission for S3 to invoke the Lambda function when new logs arrive. |
LambdaS3TriggerPolicy |
AWS::IAM::Policy |
IAM policy allowing the Lambda function to process events triggered by S3. |
NotificationUpdaterLambda |
AWS::Lambda::Function |
Utility Lambda function handling S3 event notification updates dynamically. |
NotificationUpdaterLambdaLogGroup |
AWS::Logs::LogGroup |
CloudWatch log group storing logs for the NotificationUpdaterLambda function. |
S3FailureBucketARN |
AWS::S3::Bucket |
ARN of the bucket for storing failed invocations from the edot-cloud-forwarder Lambda function, preventing data loss, in the format arn:aws:s3:::your-bucket-name. If not defined, the template creates a dedicated failure bucket automatically. |
The main Lambda function, LambdaFunction, is the core component for processing S3 logs. S3 event notifications are handled dynamically using CustomNotificationUpdater and NotificationUpdaterLambda.
CloudWatch logs ensure detailed monitoring of Lambda executions. IAM roles and permissions control access between S3 and Lambda functions, while S3FailureBucketARN prevents data loss by capturing unprocessed logs.
After EDOT Cloud Forwarder for AWS is successfully running and forwarding logs to Elastic Observability, install the Kibana integrations to visualize your data with out-of-the-box dashboards and visualizations.
To set up data visualization in Kibana:
1.Log into your Elastic Cloud deployment and open Kibana. 2. Go to Management → Integrations in the Kibana navigation menu. 3. Search for the appropriate integration based on your log type and install it:
| AWS Log Type | Integration Name | Description |
|---|---|---|
| ELB Access Logs | AWS ELB OpenTelemetry Assets | Dashboards and visualizations for Elastic Load Balancer logs |
| VPC Flow Logs | AWS VPC Flow Logs OpenTelemetry Assets | Dashboards and visualizations for VPC flow log data |
- Once installed, navigate to Dashboard to view the pre-built dashboards for your AWS log data.
EDOT Cloud Forwarder store Lambda invocation events related to retryable errors at the S3 bucket specified by S3FailureBucketARN parameter.
Retryable errors here include,
- Network errors when attempting to forward to OTLPEndpoint
- Invalid or expired ElasticApiKey
- Lambda triggered by events that mismatch EdotCloudForwarderS3LogsType selection
These errors can be replayed manually to back-fill any gaps in your data.
To replay errors invoke the Lambda with manual trigger type replayFailedEvents. Replace <LAMBDA_NAME> with the name from your deployment.
aws lambda invoke \
--function-name <LAMBDA_NAME> \
--payload '{ "replayFailedEvents": {"replayFailedEvents":{"dryrun":false,"removeOnSuccess":true}}}' \
--cli-binary-format raw-in-base64-out /dev/null
The following settings are available:
| Option | Description | Default |
|---|---|---|
| dryrun | Run the command without processing actual backup events. Useful to understand details about replaying error files from Lambda CloudWatch logs. | false |
| removeOnSuccess | Configure whether to remove error event from S3 error destination, if processing is successful. | true |
When successful, you should get "StatusCode": 200 as the output. Check CloudWatch logs (resource LambdaLogGroup) for detailed logs.
With AWS CLI, you can use --timeout to increase currently configured Lambda timeout for custom invocations.
However, if a timeout occurs, you need to run the custom event multiple times to fully process all error events from the bucket.
If you no longer need a deployed stack and want to clean up all associated resources, you can delete it using the following command:
aws cloudformation delete-stack \
--stack-name <stack-name> \
--region <stack-region>
Deleting a stack will remove all AWS resources created by that stack. However, if you allowed the stack to automatically create a dedicated S3 bucket for failed Lambda invocations, that bucket will not be deleted if it contains objects, because CloudFormation doesn't force-delete non-empty buckets. To remove the bucket entirely, you must empty it manually before deleting it.
If you specified an existing bucket through the S3FailureBucketARN parameter instead, that bucket will not be deleted because it is not managed by the stack.
Example: Deleting a stack
The following command deletes the edot-cloud-forwarder-vpc stack:
aws cloudformation delete-stack \
--stack-name edot-cloud-forwarder-vpc \
--region eu-central-1
You can monitor the deletion progress in the AWS Console under CloudFormation → Stacks, or through this command:
aws cloudformation describe-stacks \
--stack-name <stack-name> \
--region <stack-region>
If the stack deletion fails and remains in a DELETE_FAILED state, you can retry the deletion with force mode:
aws cloudformation delete-stack \
--stack-name edot-cloud-forwarder-vpc \
--region eu-central-1 \
--deletion-mode FORCE_DELETE_STACK
This forcibly deletes the stack's resources, except any that cannot be deleted, like the failure S3 bucket if it still contains objects. For a complete cleanup, empty the bucket manually before retrying deletion.