-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Update lambda-logs-collection-troubleshooting-guide.md #33162
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Preview links (active after the
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for making this update! Let me know if you have any questions on my suggestions.
|
|
||
| ## Check the Lambda function Permissions | ||
|
|
||
| Permission issues may also be impacting the ability of the forwarder to access log sources. The lambda function uses a resource based policy (unrelated to the Datadog Integration Role policy) to allow permission to access log sources. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Permission issues may also be impacting the ability of the forwarder to access log sources. The lambda function uses a resource based policy (unrelated to the Datadog Integration Role policy) to allow permission to access log sources. | |
| Permission issues may also be impacting the ability of the forwarder to access log sources. The lambda function uses a resource-based policy (unrelated to the Datadog Integration Role policy) to grant access log sources. |
| get-policy command aws lambda get-policy --function-name <FUNCTION_NAME> | ||
| ``` | ||
|
|
||
| This command returns a resource-based policy that specifies which AWS services and resources (like specific S3 buckets) are allowed to invoke the forwarder function. Crucially, ensure the Action and Resource elements in the policy document exactly match the specifications in the [public documentation][5]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This formats the information in a yellow banner.
| This command returns a resource-based policy that specifies which AWS services and resources (like specific S3 buckets) are allowed to invoke the forwarder function. Crucially, ensure the Action and Resource elements in the policy document exactly match the specifications in the [public documentation][5]. | |
| This command returns a resource-based policy that specifies which AWS services and resources (like specific S3 buckets) are allowed to invoke the forwarder function. | |
| <div class="alert alert-danger"> | |
| The Action and Resource elements in the policy document **must exactly match** the specifications in the <a href="/logs/guide/forwarder/?tab=cloudformation#permissions">Datadog Forwarder permissions</a>. | |
| </div> |
|
|
||
| ### Automatic trigger | ||
|
|
||
| If Datadog is failing to automatically create triggers, follow this troubleshooting checklist: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| If Datadog is failing to automatically create triggers, follow this troubleshooting checklist: | |
| If Datadog fails to automatically create triggers, follow this troubleshooting checklist: |
| 2. Verify the [required permissions][10] have been added to the integration role | ||
| 3. If the log source is a Lambda log group, verify if the lambda function has the [extension][11] installed | ||
| 4. If the log source is a CloudWatch log group, ensure it does not already have the maximum number of subscribers (2) | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| 1. Verify that the Forwarder ARN appears in the Log Collection tab of the AWS Integration. | |
| 2. Verify that the [required permissions][10] are assigned to the integration role. | |
| 3. If the log source is a Lambda log group, verify that the lambda function has the [extension][11] installed. | |
| 4. If the log source is a CloudWatch log group, verify that it does not already have two subscribers (the maximum allowed). |
|
|
||
| 4. Set environment variable "DD_LOG_LEVEL" to "debug" on the forwarder Lambda function to enable the debugging logs for further debugging. The debugging logs are quite verbose; remember to disable it after debugging. | ||
|
|
||
| ### Are your logs filtered by the lambda function? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ### Are your logs filtered by the lambda function? | |
| ### Logs filtered by the lambda function |
What does this PR do? What is the motivation?
Merge instructions
Merge readiness:
For Datadog employees:
Your branch name MUST follow the
<name>/<description>convention and include the forward slash (/). Without this format, your pull request will not pass CI, the GitLab pipeline will not run, and you won't get a branch preview. Getting a branch preview makes it easier for us to check any issues with your PR, such as broken links.If your branch doesn't follow this format, rename it or create a new branch and PR.
[6/5/2025] Merge queue has been disabled on the documentation repo. If you have write access to the repo, the PR has been reviewed by a Documentation team member, and all of the required checks have passed, you can use the Squash and Merge button to merge the PR. If you don't have write access, or you need help, reach out in the #documentation channel in Slack.
Additional notes