Please follow these steps:
- Fork repository and apply your changes.
- Create a PR to some feature branch in our repo (not to master!)
- We will review your changes and pull them as our feature branch.
- Then we will be able to run test pipeline on it, merge to our master and release.
Thank you!
See the official project documentation for overview and user's manual. This readme contains only additional technical details.
CloudWatch Log Groups are subscribed to using Subscription Filters. Their target is Kinesis Data Firehose to which logs are streamed. It aggregates them into batches and sends those batches to a Lambda function for processing. The function processes the received logs and forwards them through Active Gate to Dynatrace Logs API.
Active Gate is required to forward logs to your Dynatrace cluster. You can run it in the same region as the AWS stack or anywhere else as long as you ensure connectivity (especially: open port 9999). In order to install an Active Gate, follow this instruction.
Debug EC2 ActiveGate installation
First, check if ActiveGate is visible in UI (Deployment Status/Active Gates). Right now its label will be EC2's hostname (includes EC2's private IP).
If it is not visible, follow these steps to check AG installation logs:
- Enable SSH traffic in EC2 Security Group.
- Connect to EC2 through EC2 Instance Connect in EC2 screen in AWS Console. Use user
ec2-user
. You don't need any SSH keys in this scenario. - Check if file
/home/ec2-user/userdata-ag-installation-success
exists. If it does, installation was successful. - Check
/var/log/cloud-init-output.log
using sudo. You will find installation script logs there.