Using CloudFormation For CloudWatch Logs Integration

You can automate the entire setup using our CloudFormation template, which creates all required resources in a single deployment.

Prerequisites:

  • AWS CLI configured with appropriate permissions

  • groundcover 3rd party ingestion key - learn how to obtain your ingestion key

  • CloudWatch log groups

  • Your BYOC site name - to be used for your Firehose URL. You can find your BYOC endpoint in the ingestion keys tab

Deploy using AWS Console:

Option 1: Direct deployment (Recommended)

  1. Launch the CloudFormation stack directly - This will open the AWS Console with the template pre-loaded.

  2. Fill in parameters:

    • GroundcoverApiToken (required): Your groundcover ingestion key

    • EnvironmentName: Environment name in groundcover (default: production)

    • LogGroupNames: Comma-separated list of log group names (e.g., /aws/lambda/func1,/aws/lambda/func2)

    • GroundcoverEndpoint: groundcover Firehose endpoint URL (e.g., https://<your-byoc-site>/v1/firehose/logs)

  3. Click Create stack

Option 2: Manual upload

  1. Go to CloudFormation in AWS Console

  2. Click Create StackWith new resources (standard)

  3. Choose Specify an Amazon S3 template URL and enter: https://groundcover-public-cloudformation-templates.s3.us-east-1.amazonaws.com/groundcover-firehose-multi.yaml

  4. Fill in parameters:

    • GroundcoverApiToken (required): Your groundcover ingestion key

    • EnvironmentName: Environment name in groundcover (default: production)

    • LogGroupNames: Comma-separated list of log group names (e.g., /aws/lambda/func1,/aws/lambda/func2)

    • GroundcoverEndpoint: groundcover Firehose endpoint URL (e.g., https://<your-byoc-site>/v1/firehose/logs)

  5. Under Capabilities, check I acknowledge that AWS CloudFormation might create IAM resources

  6. Click Create stack

Deploy using AWS CLI:

Download the template and deploy:

Or deploy directly using the template URL:

What gets created:

  • Kinesis Data Firehose stream configured for groundcover

  • IAM roles for CloudWatch Logs, Firehose, and Lambda

  • S3 backup bucket for failed deliveries

  • Subscription filters for all specified log groups

Adding more log groups:

Update the stack with new log group names:

Last updated