Support Logging setup

                      Amazon Cloudwatch Logs

                      Send Amazon Cloudwatch Logs to Loggly

                      You can push Amazon Cloudwatch Logs (CWL) to Loggly using an Amazon Lambda Blueprint. Please note these instructions are for Cloudwatch Logs, which are different from Cloudwatch metrics. Follow the instructions below.

                      AWS Setup

                      For this step you need to install the AWS Command Line Interface (AWS CLI). If you don’t have the AWS CLI installed, click here to learn more about its installation and usage.

                      NOTE: Always use the latest version of AWS CLI to get all the updated features. You can update the AWS CLI using the command below:

                      pip install --upgrade awscli

                      If you are new to AWS, follow this link to learn how to get AWS Access Key, Access ID and Region information.

                      1. Encrypt Loggly Customer Token

                      Please make sure that the AWS CLI is configured and is using the correct AWS Access Key ID, AWS Secret Access Key and Default region name using ‘aws configure’ command.

                      aws configure

                      Create a KMS key using the steps mentioned in the link with alias name: logglyCustomerToken
                      Encrypt the Loggly Customer Token using the AWS CLI. Please retain the quotes around the TOKEN below.

                      aws kms encrypt --key-id alias/logglyCustomerToken --plaintext "TOKEN"


                      Sample Output:

                      You should see something like the output below. If you are getting any error, please make sure the user has access to the KMS key.

                      sample output

                      2.?Create a Lamba Role

                      Sign in to your AWS account and open the IAM console –
                      In your IAM console:

                      – Create a new Role say, ‘CloudWatch-Full-Access-Role‘.

                      create role

                      – Select Role type as ‘Lambda‘ from the AWS Service Roles.


                      – Attach policy ‘CloudWatchFullAccess‘ and save.

                      attach policy



                      3. Create Lambda Function from the blueprint

                      Go to AWS Lambda Console. Click the “Create function” button.

                      Select the “cloudwatch-logs-to-loggly”?Loggly blueprint

                      4. Configure triggers

                      Configure the triggers to?call your Lambda function as below.

                      Log Group: Select your log group whose logs you want to send to Loggly.
                      Filter Name: Provide your filter name.
                      Filter Pattern: This is not a mandatory field. You can keep it empty.
                      Enable trigger: Check this option to enable the trigger. You could also come back to this setting later to enable it.
                      Click on Next button.

                      5. Configure function and Add Environment Variables:

                      Configure Environment Variables as below:

                      kmsEncrptedCustomerToken: Copy the base-64 encoded, encrypted token from step 1's CLI output (CiphertextBlob attribute) and paste it in kmsEncryptionCustomerToken key. 
                      logglyTags: Enter logglyTags as per your requirement
                      logglyHostName: Enter

                      Important: Select the correct KMS key to encrypt. Not selecting the right key here will not make this function work.


                      6. Configure?Lambda function handler and role

                      Role: Choose an existing role. Select the role created in Step 2. 
                      Memory (MB): set memory to 512. You can increase it as needed.
                      Timeout: Set time out to 1 min.You can increase it as needed.
                      KMS key: Select logglyCustomerToken from the dropdown
                      Click on the next button to review the function and then click on “Create function”. ?

                      7.?Adding CloudWatch-Full-Access-Role to the list of IAM users and roles who can use the key:

                      You need to add CloudWatch-Full-Access-Role to the list of IAM users and roles who can use this key to encrypt and decrypt data from within the applications and when using AWS services integrated with KMS. Head to the IAM and add the CloudWatch-Full-Access-Role role as shown below.

                      Important: If you miss this step you will not be able to successfully send Cloudwatch logs to Loggly.

                      8.?Test your function

                      Configure the test function by clicking under Actions -> Configure test event.
                      A window will open. Select Cloudwatch Logs from the dropdown and click Save and test.
                      If it tests successfully, you will see the message below. If you get an error, check the troubleshooting section below:
                      If you haven’t enabled the trigger in step 3, ?you can go to configure trigger from the left side menu to enable it.

                      8. Verify Events

                      Search Loggly events with the tag as cloudwatch2loggly over the past 20 minutes. It may take few minutes to index the events. If it doesn’t work, see the troubleshooting section below.


                      Advanced Amazon CloudWatch Options


                      If you don’t see any data show up in the verification step, check for these common problems.

                        • Make sure you’ve included your own customer token
                        • Make sure you are using the latest version of AWS CLI
                        • Make sure you have configured the same roles as mentioned above
                        • Create new role from template(s) only
                        • Go to your Lambda function in AWS Console and click on View logs in Cloudwatch in the Monitoring tab to view logs.
                        • Search or post your own Amazon Cloudwatch logging questions in the community forum.


                      Thanks for the feedback! We'll use it to improve our support documentation.