Deploy EDOT Cloud Forwarder for AWS
EDOT Cloud Forwarder for AWS can be deployed using any of the following methods:
| Deployment method | Description |
|---|---|
| CloudFormation (AWS CLI) | Deploy using AWS CLI commands with CloudFormation templates. |
| CloudFormation (AWS Console) | Deploy using the AWS Management Console UI. |
| AWS Serverless Application Repository (SAR) | Deploy directly from the AWS Serverless Application Repository. |
Each method achieves the same result and uses CloudFormation templates. Choose the method that best adapts to your workflow.
Use the AWS CLI to deploy the EDOT Cloud Forwarder with CloudFormation templates. This method is ideal for automation and infrastructure-as-code workflows.
The following examples show how to deploy the ECF Cloud Forwarder using AWS CloudFormation CLI. Copy and paste these commands after replacing the placeholder values with your actual configuration.
- Use the
--template-urlflag to reference a template hosted on S3. - Use the
--regionflag to specify the AWS region where the CloudFormation stack will be deployed. The CloudFormation stack deployment region must match the region of the S3 bucket where your logs are stored. - To always use the most recent stable templates, use the
latestpath. For example,v1/latest. - To pin a specific version, replace
latestwith the desired version tag. For example,v1/v{{version.edot-cf-aws}}.
Alternatively, if you have downloaded the template file, use the --template-body file://<path> option with a local template file.
This example deploys a CloudFormation stack to collect VPC Flow logs stored in an S3 bucket.
aws cloudformation create-stack \
--stack-name edot-cloud-forwarder-vpc \
--template-url https://edot-cloud-forwarder.s3.amazonaws.com/v1/latest/cloudformation/s3_logs-cloudformation.yaml \
--capabilities CAPABILITY_NAMED_IAM \
--region eu-central-1 \
--parameters \
ParameterKey=SourceS3BucketARN,ParameterValue=your-s3-vpc-bucket-arn \
ParameterKey=OTLPEndpoint,ParameterValue="<placeholder>" \
ParameterKey=ElasticAPIKey,ParameterValue="<placeholder>" \
ParameterKey=EdotCloudForwarderS3LogsType,ParameterValue="vpcflow"
This example deploys a CloudFormation stack to collect ALB Access logs stored in an S3 bucket.
aws cloudformation create-stack \
--stack-name edot-cloud-forwarder-alb \
--template-url https://edot-cloud-forwarder.s3.amazonaws.com/v1/latest/cloudformation/s3_logs-cloudformation.yaml \
--capabilities CAPABILITY_NAMED_IAM \
--region eu-central-1 \
--parameters \
ParameterKey=SourceS3BucketARN,ParameterValue=your-s3-alb-bucket-arn \
ParameterKey=OTLPEndpoint,ParameterValue="<placeholder>" \
ParameterKey=ElasticAPIKey,ParameterValue="<placeholder>" \
ParameterKey=EdotCloudForwarderS3LogsType,ParameterValue="elbaccess"
This example deploys a CloudFormation stack to collect CloudTrail logs stored in an S3 bucket.
aws cloudformation create-stack \
--stack-name edot-cloud-forwarder-cloudtrail \
--template-url https://edot-cloud-forwarder.s3.amazonaws.com/v1/latest/cloudformation/s3_logs-cloudformation.yaml \
--capabilities CAPABILITY_NAMED_IAM \
--region eu-central-1 \
--parameters \
ParameterKey=SourceS3BucketARN,ParameterValue=your-cloudtrail-bucket-arn \
ParameterKey=OTLPEndpoint,ParameterValue="<placeholder>" \
ParameterKey=ElasticAPIKey,ParameterValue="<placeholder>" \
ParameterKey=EdotCloudForwarderS3LogsType,ParameterValue="cloudtrail_log"
The --capabilities CAPABILITY_NAMED_IAM flag is required because this CloudFormation template creates AWS Identity and Access Management (IAM) resources. More specifically, it creates a named IAM role (LambdaExecutionRole) for the Lambda function. To acknowledge that AWS CloudFormation might create or modify IAM resources with custom names, you must specify the CAPABILITY_NAMED_IAM capability.
To update an existing CloudFormation stack while preserving some parameter values, follow these steps:
-
Identify the stack to update
Determine the name of the CloudFormation stack you want to modify.
-
Prepare the update command
Use the following structure for your update command:
- Include all required parameters.
- Use
UsePreviousValue=truefor parameters that should remain unchanged. - Specify
ParameterValue=<new-value>for parameters that need to be updated.
-
Run the
update-stackcommandRun the command with the following parameters:
aws cloudformation update-stack \ --template-url https://edot-cloud-forwarder.s3.amazonaws.com/v1/latest/cloudformation/<template-file-name>.yaml \ --stack-name <stack-name> \ --capabilities CAPABILITY_NAMED_IAM \ --region eu-central-1 \ --parameters \ ParameterKey=Param1,UsePreviousValue=true \ ParameterKey=Param2,UsePreviousValue=true \ ParameterKey=Param3,UsePreviousValue=true \ ParameterKey=Param4,ParameterValue=<new-value>Example using S3 logs templateFor example, to modify the S3 bucket ARN for the
edot-cloud-forwarder-vpcstack while keeping other parameter values unchanged:aws cloudformation update-stack \ --template-url https://edot-cloud-forwarder.s3.amazonaws.com/v1/latest/cloudformation/s3_logs-cloudformation.yaml \ --stack-name edot-cloud-forwarder-vpc \ --capabilities CAPABILITY_NAMED_IAM \ --region eu-central-1 \ --parameters \ ParameterKey=OTLPEndpoint,UsePreviousValue=true \ ParameterKey=ElasticAPIKey,UsePreviousValue=true \ ParameterKey=EdotCloudForwarderS3LogsType,UsePreviousValue=true \ ParameterKey=SourceS3BucketARN,ParameterValue=your-new-s3-vpc-bucket-arn -
Verify the update
After running the command, check the stack status in the AWS Management Console under CloudFormation → Stacks. Then, run this command to confirm the updated parameter values:
aws cloudformation describe-stacks --stack-name <stack-name>
Deploy EDOT Cloud Forwarder for AWS with one click using the AWS CloudFormation console:
After clicking the button:
Configure the required parameters:
Parameter Description stack-nameName of the CloudFormation stack, for example vpc-edot-cf.OTLPEndpointThe OTLP endpoint URL from Elastic Cloud Serverless or Elastic Cloud Hosted. ElasticApiKeyAPI key for authentication with Elastic. SourceS3BucketARNARN of the S3 bucket where your logs are stored. EdotCloudForwarderS3LogsTypeThe log type: vpcflow,elbaccess, orcloudtrail.Select Next and check Acknowledge IAM capabilities.
Review your configuration and select Submit to deploy the stack.
Monitor the progress until the stack reaches the
CREATE_COMPLETEstate.
The CloudFormation stack deployment region must match the region of the S3 bucket where your logs are stored.
To manually specify the template, follow these steps:
- Navigate to CloudFormation in the AWS Console.
- Select Create Stack and choose With new resources (standard) to start a fresh deployment.
- Select one of the following options under Specify template:
- Amazon S3 URL (Recommended): Paste the CloudFormation template URL from CloudFormation templates.
- Upload a template file: Download the template from the S3 URL and upload it manually.
- Select Next and configure all required parameters using the settings described in Configure the template.
- Select Next again and check Acknowledge IAM capabilities. This is required because the template creates named IAM roles with permissions to access the required resources.
- Review your configuration and select Submit to deploy the stack.
- Monitor the progress until the stack reaches the
CREATE_COMPLETEstate.
To modify parameters of an existing stack through the AWS Console:
- Navigate to CloudFormation in the AWS Management Console.
- Select the stack you want to update.
- Click Update stack and select either Make a direct update or Create a change set.
- Choose Use existing template.
- Select Next.
- Modify the parameter values as needed (refer to Configure the template for parameter descriptions).
- Select Next and review your changes.
- Select Submit to apply the updates. In case of a change set, Execute changeset .
- Monitor the stack update progress in the console.
In addition to deploying through CloudFormation templates, you can deploy the EDOT Cloud Forwarder application directly from the AWS Serverless Application Repository (SAR).
To deploy from SAR, follow these steps:
- Navigate to AWS Serverless Application Repository in the AWS Management Console.
- Select Available applications and check the box Show apps that create custom IAM roles or resource policies.
- Search for
edot-cloud-forwarder-s3-logsand select the application. - Configure the application settings: Under Application settings, fill in the parameters described in the Configure the template section. Refer to that section for details on each parameter.
- Acknowledge IAM role creation: At the bottom of the page, check the box to acknowledge that the application will create custom IAM roles. This is required for the forwarder to access your S3 bucket and send data to Elastic Observability.
- Select Deploy.
The deployment process will start, and a CloudFormation stack will be created with all the necessary resources. You can monitor the progress in the AWS CloudFormation console under Stacks.
The same deployment considerations apply to SAR deployments, including the requirement to deploy separate serverless applications for each log type and ensure the deployment region matches your S3 bucket region.
The CloudFormation templates create a number of resources to process logs from a specific log source.
This is a list of resources created by the stack when processing S3 logs.
| Resource name | Type | Description |
|---|---|---|
CustomNotificationUpdater |
AWS::CloudFormation::CustomResource |
Custom resource used to manage S3 event notifications dynamically. |
LambdaExecutionRole |
AWS::IAM::Role |
IAM role granting permissions needed for the Lambda function to interact with S3 and other AWS services. |
LambdaFunction |
AWS::Lambda::Function |
Core Lambda function responsible for processing incoming logs from S3. This is a key resource in the stack. |
LambdaInvokeConfig |
AWS::Lambda::EventInvokeConfig |
Configures error handling and invocation settings for the Lambda function. |
LambdaLogGroup |
AWS::Logs::LogGroup |
CloudWatch log group storing logs for the main Lambda function. Useful for debugging and monitoring. |
LambdaPermissionS3Bucket |
AWS::Lambda::Permission |
Grants permission for S3 to invoke the Lambda function when new logs arrive. |
LambdaS3TriggerPolicy |
AWS::IAM::Policy |
IAM policy allowing the Lambda function to process events triggered by S3. |
NotificationUpdaterLambda |
AWS::Lambda::Function |
Utility Lambda function handling S3 event notification updates dynamically. |
NotificationUpdaterLambdaLogGroup |
AWS::Logs::LogGroup |
CloudWatch log group storing logs for the NotificationUpdaterLambda function. |
S3FailureBucketARN |
AWS::S3::Bucket |
ARN of the bucket for storing failed invocations from the edot-cloud-forwarder Lambda function, preventing data loss, in the format arn:aws:s3:::your-bucket-name. If not defined, the template creates a dedicated failure bucket automatically. |
The main Lambda function, LambdaFunction, is the core component for processing S3 logs. S3 event notifications are handled dynamically using CustomNotificationUpdater and NotificationUpdaterLambda.
CloudWatch logs ensure detailed monitoring of Lambda executions. IAM roles and permissions control access between S3 and Lambda functions, while S3FailureBucketARN prevents data loss by capturing unprocessed logs.
If you no longer need a deployed stack and want to clean up all associated resources, you can remove it using either the AWS CLI or the AWS Console.
Deleting a stack removes all AWS resources created by that stack. However:
- If you allowed the stack to automatically create a dedicated S3 bucket for failed Lambda invocations, that bucket is not removed if it contains objects, because CloudFormation doesn't force-remove non-empty buckets. To remove the bucket entirely, you must empty it manually before deleting it.
- If you specified an existing bucket through the
S3FailureBucketARNparameter, that bucket is not removed because it is not managed by the stack.
Use the following command to remove a stack:
aws cloudformation delete-stack \
--stack-name <stack-name> \
--region <stack-region>
You can monitor the deletion progress through this command:
aws cloudformation describe-stacks \
--stack-name <stack-name> \
--region <stack-region>
If the stack deletion fails and remains in a DELETE_FAILED state, you can retry the deletion with force mode:
aws cloudformation delete-stack \
--stack-name <stack-name> \
--region <stack-region> \
--deletion-mode FORCE_DELETE_STACK
This forcibly removes the stack's resources, except any that cannot be removed, like the failure S3 bucket if it still contains objects. For a complete cleanup, empty the bucket manually before retrying deletion.
Example: Deleting a stack using AWS CLI
The following command removes the edot-cloud-forwarder-vpc stack:
aws cloudformation delete-stack \
--stack-name edot-cloud-forwarder-vpc \
--region eu-central-1
Monitor the deletion progress:
aws cloudformation describe-stacks \
--stack-name edot-cloud-forwarder-vpc \
--region eu-central-1
To remove a stack using the AWS Management Console:
- Navigate to CloudFormation in the AWS Management Console.
- Select the stack you want to remove from the list.
- Click Delete at the top of the stack details page.
- Monitor the deletion progress on the Events tab or wait until the stack disappears from the stack list (indicating deletion is complete).
- Configuration settings: Learn about all configuration options, including optional settings and sizing recommendations.
- Troubleshooting: Diagnose and resolve issues with log forwarding.
