Using CloudFormation For CloudWatch Logs Integration
You can automate the entire setup using our CloudFormation template, which creates all required resources in a single deployment.
Prerequisites:
AWS CLI configured with appropriate permissions
groundcover "3rd Party" ingestion key - learn how to obtain your ingestion key
CloudWatch log groups
Your BYOC site name - to be used for your Firehose URL. You can find your BYOC endpoint in the ingestion keys tab
Parameters:
BYOCEndpoint (required): The endpoint of the BYOC backend
IngestionKey (required): Your groundcover "3rd Party" type ingestion key
LogGroupNames (required): Comma-separated list of log group names (e.g.,
/aws/lambda/func1,/aws/lambda/func2)EnvironmentName (recommended): Environment name in groundcover
Deploy using AWS Console:
Option 1: Direct deployment (Recommended)
Launch the CloudFormation stack directly - This will open the AWS Console with the template pre-loaded.
Fill in parameters from previous section.
Click Create stack
Option 2: Manual upload
Go to CloudFormation in AWS Console
Click Create Stack → With new resources (standard)
Choose Specify an Amazon S3 template URL and enter:
https://groundcover-public-cloudformation-templates.s3.us-east-1.amazonaws.com/groundcover-firehose-multi.yamlFill in parameters from previous section.
Under Capabilities, check I acknowledge that AWS CloudFormation might create IAM resources
Click Create stack
Deploy using AWS CLI:
Download the template and deploy:
Or deploy directly using the template URL:
What gets created:
Kinesis Data Firehose stream configured for groundcover
IAM roles for CloudWatch Logs, Firehose, and Lambda
S3 backup bucket for failed deliveries
Subscription filters for all specified log groups
Adding more log groups:
Update the stack with new log group names:
Last updated
