mirror of https://github.com/grafana/loki
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
216 lines
14 KiB
216 lines
14 KiB
|
5 years ago
|
---
|
||
|
2 years ago
|
title: Lambda Promtail client
|
||
|
|
menuTitle: Lambda Promtail
|
||
|
|
description: How to configure the Lambda Promtail client workflow.
|
||
|
|
aliases:
|
||
|
|
- ../clients/lambda-promtail/
|
||
|
|
weight: 700
|
||
|
5 years ago
|
---
|
||
|
5 years ago
|
|
||
|
2 years ago
|
# Lambda Promtail client
|
||
|
|
|
||
|
|
Grafana Loki includes [Terraform](https://www.terraform.io/) and [CloudFormation](https://aws.amazon.com/cloudformation/) for shipping Cloudwatch, Cloudtrail, VPC Flow Logs and loadbalancer logs to Loki via a [lambda function](https://aws.amazon.com/lambda/). This is done via [lambda-promtail](https://github.com/grafana/loki/blob/main/tools/lambda-promtail) which processes cloudwatch events and propagates them to Loki (or a Promtail instance) via the push-api [scrape config]({{< relref "../../clients/promtail/configuration#loki_push_api" >}}).
|
||
|
5 years ago
|
|
||
|
4 years ago
|
## Deployment
|
||
|
5 years ago
|
|
||
|
4 years ago
|
lambda-promtail can easily be deployed via provided [Terraform](https://github.com/grafana/loki/blob/main/tools/lambda-promtail/main.tf) and [CloudFormation](https://github.com/grafana/loki/blob/main/tools/lambda-promtail/template.yaml) files. The Terraform deployment also pulls variable values defined from [variables.tf](https://github.com/grafana/loki/blob/main/tools/lambda-promtail/variables.tf).
|
||
|
5 years ago
|
|
||
|
4 years ago
|
For both deployment types there are a few values that must be defined:
|
||
|
|
- the write address, a Loki Write API compatible endpoint (Loki or Promtail)
|
||
|
|
- basic auth username/password if the write address is a Loki endpoint and has authentication
|
||
|
|
- the lambda-promtail image, full ECR repo path:tag
|
||
|
5 years ago
|
|
||
|
4 years ago
|
The Terraform deployment also takes in an array of log group and bucket names, and can take arrays for VPC subnets and security groups.
|
||
|
5 years ago
|
|
||
|
4 years ago
|
There's also a flag to keep the log stream label when propagating the logs from Cloudwatch, which defaults to false. This can be helpful when the cardinality is too large, such as the case of a log stream per lambda invocation.
|
||
|
5 years ago
|
|
||
|
3 years ago
|
Additionally, an environment variable can be configured to add extra labels to the logs streamed by lambda-protmail.
|
||
|
|
These extra labels will take the form `__extra_<name>=<value>`.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
An optional environment variable can be configured to add the tenant ID to the logs streamed by lambda-protmail.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
In an effort to make deployment of lambda-promtail as simple as possible, we've created a [public ECR repo](https://gallery.ecr.aws/grafana/lambda-promtail) to publish our builds of lambda-promtail. Users may clone this repo, make their own modifications to the Go code, and upload their own image to their own ECR repo.
|
||
|
4 years ago
|
|
||
|
|
### Examples
|
||
|
|
|
||
|
|
Terraform:
|
||
|
|
```
|
||
|
3 years ago
|
## use cloudwatch log group
|
||
|
4 years ago
|
terraform apply -var "lambda_promtail_image=<repo:tag>" -var "write_address=https://logs-prod-us-central1.grafana.net/loki/api/v1/push" -var "password=<password>" -var "username=<user>" -var 'log_group_names=["/aws/lambda/log-group-1", "/aws/lambda/log-group-2"]' -var 'bucket_names=["bucket-a", "bucket-b"]' -var 'batch_size=131072'
|
||
|
4 years ago
|
```
|
||
|
|
|
||
|
3 years ago
|
```
|
||
|
|
## use kinesis data stream
|
||
|
|
terraform apply -var "<ecr-repo>:<tag>" -var "write_address=https://your-loki-url/loki/api/v1/push" -var "password=<basic-auth-pw>" -var "username=<basic-auth-username>" -var 'kinesis_stream_name=["kinesis-stream-01", "kinesis-stream-02"]' -var 'extra_labels="name1,value1,name2,value2"' -var "tenant_id=<value>"
|
||
|
|
```
|
||
|
|
|
||
|
3 years ago
|
The first few lines of `main.tf` define the AWS region to deploy to.
|
||
|
3 years ago
|
Modify as desired, or remove and deploy to
|
||
|
4 years ago
|
```
|
||
|
|
provider "aws" {
|
||
|
|
region = "us-east-2"
|
||
|
|
}
|
||
|
|
```
|
||
|
|
|
||
|
|
To keep the log group label add `-var "keep_stream=true"`.
|
||
|
|
|
||
|
3 years ago
|
To add extra labels add `-var 'extra_labels="name1,value1,name2,value2"'`.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
To add tenant id add `-var "tenant_id=value"`.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
Note that the creation of a subscription filter on Cloudwatch in the provided Terraform file only accepts an array of log group names.
|
||
|
|
It does **not** accept strings for regex filtering on the logs contents via the subscription filters. We suggest extending the Terraform file to do so.
|
||
|
3 years ago
|
Or, have lambda-promtail write to Promtail and use [pipeline stages](/docs/loki/latest/clients/promtail/stages/drop/).
|
||
|
4 years ago
|
|
||
|
|
CloudFormation:
|
||
|
|
```
|
||
|
|
aws cloudformation create-stack --stack-name lambda-promtail --template-body file://template.yaml --capabilities CAPABILITY_IAM CAPABILITY_NAMED_IAM --region us-east-2 --parameters ParameterKey=WriteAddress,ParameterValue=https://logs-prod-us-central1.grafana.net/loki/api/v1/push ParameterKey=Username,ParameterValue=<user> ParameterKey=Password,ParameterValue=<password> ParameterKey=LambdaPromtailImage,ParameterValue=<repo:tag>
|
||
|
|
```
|
||
|
|
|
||
|
3 years ago
|
Within the CloudFormation template file, copy, paste, and modify the subscription filter section as needed for each log group:
|
||
|
4 years ago
|
```
|
||
|
|
MainLambdaPromtailSubscriptionFilter:
|
||
|
|
Type: AWS::Logs::SubscriptionFilter
|
||
|
|
Properties:
|
||
|
|
DestinationArn: !GetAtt LambdaPromtailFunction.Arn
|
||
|
|
FilterPattern: ""
|
||
|
|
LogGroupName: "/aws/lambda/some-lamda-log-group"
|
||
|
|
```
|
||
|
5 years ago
|
|
||
|
3 years ago
|
To keep the log group label, add `ParameterKey=KeepStream,ParameterValue=true`.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
To add extra labels, include `ParameterKey=ExtraLabels,ParameterValue="name1,value1,name2,value2"`.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
To add a tenant ID, add `ParameterKey=TenantID,ParameterValue=value`.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
To modify an existing CloudFormation stack, use [update-stack](https://docs.aws.amazon.com/cli/latest/reference/cloudformation/update-stack.html).
|
||
|
4 years ago
|
|
||
|
|
## Uses
|
||
|
|
|
||
|
|
### Ephemeral Jobs
|
||
|
|
|
||
|
3 years ago
|
This workflow is intended to be an effective approach for monitoring ephemeral jobs such as those run on AWS Lambda which are otherwise hard/impossible to monitor via one of the other Loki [clients]({{< relref ".." >}}).
|
||
|
4 years ago
|
|
||
|
3 years ago
|
Ephemeral jobs can quite easily run afoul of cardinality best practices. During high request load, an AWS lambda function might balloon in concurrency, creating many log streams in Cloudwatch. For this reason lambda-promtail defaults to **not** keeping the log stream value as a label when propagating the logs to Loki. This is only possible because new versions of Loki no longer have an ingestion ordering constraint on logs within a single stream.
|
||
|
5 years ago
|
|
||
|
|
### Proof of concept Loki deployments
|
||
|
|
|
||
|
5 years ago
|
For those using Cloudwatch and wishing to test out Loki in a low-risk way, this workflow allows piping Cloudwatch logs to Loki regardless of the event source (EC2, Kubernetes, Lambda, ECS, etc) without setting up a set of Promtail daemons across their infrastructure. However, running Promtail as a daemon on your infrastructure is the best-practice deployment strategy in the long term for flexibility, reliability, performance, and cost.
|
||
|
5 years ago
|
|
||
|
|
Note: Propagating logs from Cloudwatch to Loki means you'll still need to _pay_ for Cloudwatch.
|
||
|
|
|
||
|
3 years ago
|
### VPC Flow logs
|
||
|
|
|
||
|
|
This workflow allows ingesting AWS VPC Flow logs from s3.
|
||
|
|
|
||
|
|
One thing to be aware of with this is that the default flow log format doesn't have a timestamp, so the log timestamp will be set to the time the lambda starts processing the log file.
|
||
|
|
|
||
|
4 years ago
|
### Loadbalancer logs
|
||
|
|
|
||
|
|
This workflow allows ingesting AWS loadbalancer logs stored on S3 to Loki.
|
||
|
|
|
||
|
3 years ago
|
### Cloudtrail logs
|
||
|
|
|
||
|
|
This workflow allows ingesting AWS Cloudtrail logs stored on S3 to Loki.
|
||
|
|
|
||
|
3 years ago
|
### Cloudfront logs
|
||
|
|
Cloudfront logs can be either batched or streamed in real time to Loki:
|
||
|
|
+ Logging can be activated on a Cloudfront distribution with an S3 bucket as the destination. In this case, the workflow is the same as for other services (VPC Flow logs, Loadbalancer logs, Cloudtrail logs).
|
||
|
|
+ Cloudfront [real-time logs](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/real-time-logs.html) can be sent to a Kinesis data stream. The data stream can be mapped to be an [event source](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventsourcemapping.html) for lambda-promtail to deliver the logs to Loki.
|
||
|
3 years ago
|
|
||
|
2 years ago
|
### Triggering Lambda-Promtail via SQS
|
||
|
|
For AWS services supporting sending messages to SQS (for example, S3 with an S3 Notification to SQS), events can be processed through an [SQS queue using a lambda trigger](https://docs.aws.amazon.com/lambda/latest/dg/with-sqs.html) instead of directly configuring the source service to trigger lambda. Lambda-promtail will retrieve the nested events from the SQS messages' body and process them as if them came directly from the source service.
|
||
|
3 years ago
|
|
||
|
|
### On-Failure log recovery using SQS
|
||
|
|
Triggering lambda-promtail through SQS allows handling on-failure recovery of the logs using a secondary SQS queue as a dead-letter-queue (DLQ). You can configure lambda so that unsuccessfully processed messages will be sent to the DLQ. After fixing the issue, operators will be able to reprocess the messages by sending back messages from the DLQ to the source queue using the [SQS DLQ redrive](https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-configure-dead-letter-queue-redrive.html) feature.
|
||
|
|
|
||
|
5 years ago
|
## Propagated Labels
|
||
|
|
|
||
|
2 years ago
|
Incoming logs can have seven special labels assigned to them which can be used in [relabeling]({{< relref "../../clients/promtail/configuration#relabel_configs" >}}) or later stages in a Promtail [pipeline]({{< relref "../../clients/promtail/pipelines" >}}):
|
||
|
5 years ago
|
|
||
|
3 years ago
|
- `__aws_log_type`: Where this log came from (Cloudwatch, Kinesis or S3).
|
||
|
5 years ago
|
- `__aws_cloudwatch_log_group`: The associated Cloudwatch Log Group for this log.
|
||
|
4 years ago
|
- `__aws_cloudwatch_log_stream`: The associated Cloudwatch Log Stream for this log (if `KEEP_STREAM=true`).
|
||
|
5 years ago
|
- `__aws_cloudwatch_owner`: The AWS ID of the owner of this event.
|
||
|
3 years ago
|
- `__aws_kinesis_event_source_arn`: The Kinesis event source ARN.
|
||
|
4 years ago
|
- `__aws_s3_log_lb`: The name of the loadbalancer.
|
||
|
|
- `__aws_s3_log_lb_owner`: The Account ID of the loadbalancer owner.
|
||
|
5 years ago
|
|
||
|
|
## Limitations
|
||
|
|
|
||
|
|
### Promtail labels
|
||
|
|
|
||
|
4 years ago
|
Note: This section is relevant if running Promtail between lambda-promtail and the end Loki deployment and was used to circumvent `out of order` problems prior to the v2.4 Loki release which removed the ordering constraint.
|
||
|
4 years ago
|
|
||
|
3 years ago
|
As stated earlier, this workflow moves the worst case stream cardinality from `number_of_log_streams` -> `number_of_log_groups` * `number_of_promtails`. For this reason, each Promtail must have a unique label attached to logs it processes (ideally via something like `--client.external-labels=promtail=${HOSTNAME}`) and it's advised to run a small number of Promtails behind a load balancer according to your throughput and redundancy needs.
|
||
|
5 years ago
|
|
||
|
|
This trade-off is very effective when you have a large number of log streams but want to aggregate them by the log group. This is very common in AWS Lambda, where log groups are the "application" and log streams are the individual application containers which are spun up and down at a whim, possibly just for a single function invocation.
|
||
|
|
|
||
|
|
### Data Persistence
|
||
|
|
|
||
|
|
#### Availability
|
||
|
|
|
||
|
5 years ago
|
For availability concerns, run a set of Promtails behind a load balancer.
|
||
|
5 years ago
|
|
||
|
|
#### Batching
|
||
|
|
|
||
|
4 years ago
|
Relevant if lambda-promtail is configured to write to Promtail. Since Promtail batches writes to Loki for performance, it's possible that Promtail will receive a log, issue a successful `204` http status code for the write, then be killed at a later time before it writes upstream to Loki. This should be rare, but is a downside this workflow has.
|
||
|
|
|
||
|
4 years ago
|
This lambda will flush logs when the batch size hits the default value of `131072` (128KB), this can be changed with `BATCH_SIZE` environment variable, which is set to the number of bytes to use.
|
||
|
|
|
||
|
4 years ago
|
### Templating/Deployment
|
||
|
5 years ago
|
|
||
|
4 years ago
|
The current CloudFormation template is rudimentary. If you need to add vpc configs, extra log groups to monitor, subnet declarations, etc, you'll need to edit the template manually. If you need to subscribe to more than one Cloudwatch Log Group you'll also need to copy paste that section of the template for each group.
|
||
|
5 years ago
|
|
||
|
4 years ago
|
The Terraform file is a bit more fleshed out, and can be configured to take in an array of log group and bucket names, as well as vpc configuration.
|
||
|
4 years ago
|
|
||
|
|
The provided Terraform and CloudFormation files are meant to cover the default use case, and more complex deployments will likely require some modification and extenstion of the provided files.
|
||
|
5 years ago
|
|
||
|
|
## Example Promtail Config
|
||
|
|
|
||
|
5 years ago
|
Note: this should be run in conjunction with a Promtail-specific label attached, ideally via a flag argument like `--client.external-labels=promtail=${HOSTNAME}`. It will receive writes via the push-api on ports `3500` (http) and `3600` (grpc).
|
||
|
5 years ago
|
|
||
|
|
```yaml
|
||
|
|
server:
|
||
|
|
http_listen_port: 9080
|
||
|
|
grpc_listen_port: 0
|
||
|
|
|
||
|
|
positions:
|
||
|
|
filename: /tmp/positions.yaml
|
||
|
|
|
||
|
|
clients:
|
||
|
|
- url: http://ip_or_hostname_where_Loki_run:3100/loki/api/v1/push
|
||
|
|
|
||
|
|
scrape_configs:
|
||
|
|
- job_name: push1
|
||
|
|
loki_push_api:
|
||
|
|
server:
|
||
|
|
http_listen_port: 3500
|
||
|
|
grpc_listen_port: 3600
|
||
|
|
labels:
|
||
|
|
# Adds a label on all streams indicating it was processed by the lambda-promtail workflow.
|
||
|
|
promtail: 'lambda-promtail'
|
||
|
4 years ago
|
relabel_configs:
|
||
|
|
- source_labels: ['__aws_log_type']
|
||
|
4 years ago
|
target_label: 'log_type'
|
||
|
4 years ago
|
# Maps the cloudwatch log group into a label called `log_group` for use in Loki.
|
||
|
|
- source_labels: ['__aws_cloudwatch_log_group']
|
||
|
|
target_label: 'log_group'
|
||
|
|
# Maps the loadbalancer name into a label called `loadbalancer_name` for use in Loki.
|
||
|
3 years ago
|
- source_labels: ['__aws_s3_log_lb']
|
||
|
4 years ago
|
target_label: 'loadbalancer_name'
|
||
|
5 years ago
|
```
|
||
|
4 years ago
|
|
||
|
|
## Multiple Promtail Deployment
|
||
|
|
|
||
|
4 years ago
|
**Disclaimer: The following section is only relevant for older versions of Loki that cannot accept out of order logs.**
|
||
|
4 years ago
|
|
||
|
|
However, these may only be active for a very short while. This creates a problem for combining these short-lived log streams in Loki because timestamps may not strictly increase across multiple log streams. The other obvious route is creating labels based on log streams, which is also undesirable because it leads to cardinality problems via many low-throughput log streams.
|
||
|
|
|
||
|
|
Instead we can pipeline Cloudwatch logs to a set of Promtails, which can mitigate these problem in two ways:
|
||
|
|
|
||
|
|
1) Using Promtail's push api along with the `use_incoming_timestamp: false` config, we let Promtail determine the timestamp based on when it ingests the logs, not the timestamp assigned by cloudwatch. Obviously, this means that we lose the origin timestamp because Promtail now assigns it, but this is a relatively small difference in a real time ingestion system like this.
|
||
|
|
2) In conjunction with (1), Promtail can coalesce logs across Cloudwatch log streams because it's no longer susceptible to out-of-order errors when combining multiple sources (lambda invocations).
|
||
|
|
|
||
|
2 years ago
|
One important aspect to keep in mind when running with a set of Promtails behind a load balancer is that we're effectively moving the cardinality problems from the number of log streams -> number of Promtails. If you have not configured Loki to [accept out-of-order writes]({{< relref "../../configure#accept-out-of-order-writes" >}}), you'll need to assign a Promtail-specific label on each Promtail so that you don't run into out-of-order errors when the Promtails send data for the same log groups to Loki. This can easily be done via a configuration like `--client.external-labels=promtail=${HOSTNAME}` passed to Promtail.
|