quickstart-amazon-eks-cluster-resource-provider icon indicating copy to clipboard operation
quickstart-amazon-eks-cluster-resource-provider copied to clipboard

No logs being delivery to CloudWatch

Open andre-lx opened this issue 2 years ago • 0 comments

Hi.

We can't have logs from the extension in CloudWatch. We already tried out different regions.

The issue may be linked to this: https://github.com/aws-quickstart/quickstart-kubernetes-resource-provider/issues/32

We have some log groups from some installation made in July, but for new deployments there are no logs at all in CloudWatch.

Our deployment:

AWSTemplateFormatVersion: '2010-09-09'
Description: Extensions
Resources:
  # AWSQS::EKS::Cluster
  AWSQSEKSClusterExecutionRole:
    Type: AWS::IAM::Role
    Properties:
      RoleName: !Join
        - '-'
        - - 'AWSQSExecutionIAMRole'
          - !Select [2, !Split [ '/', !Ref AWS::StackId ]]
      MaxSessionDuration: 8400
      AssumeRolePolicyDocument:
        Version: '2012-10-17'
        Statement:
        - Effect: Allow
          Principal:
            Service:
            - resources.cloudformation.amazonaws.com
            - cloudformation.amazonaws.com
            - lambda.amazonaws.com
          Action: sts:AssumeRole
      Path: '/'
      Policies:
      - PolicyName: !Join
          - '-'
          - - 'AWSQSExecutionIAMRole'
            - 'policy'
            - !Select [2, !Split [ '/', !Ref AWS::StackId ]]
        PolicyDocument:
          Version: '2012-10-17'
          Statement:
          - Effect: Allow
            Action:
            - sts:GetCallerIdentity
            - eks:CreateCluster
            - eks:DeleteCluster
            - eks:DescribeCluster
            - eks:ListTagsForResource
            - eks:UpdateClusterVersion
            - eks:UpdateClusterConfig
            - eks:TagResource
            - eks:UntagResource
            - iam:PassRole
            - sts:AssumeRole
            - lambda:UpdateFunctionConfiguration
            - lambda:DeleteFunction
            - lambda:GetFunction
            - lambda:InvokeFunction
            - lambda:CreateFunction
            - lambda:UpdateFunctionCode
            - ec2:DescribeVpcs
            - ec2:DescribeSubnets
            - ec2:DescribeSecurityGroups
            - kms:CreateGrant
            - kms:DescribeKey
            Resource:
            - '*'
      Tags:
      - Key: Name
        Value: !Join
          - '-'
          - - 'AWSQSExecutionIAMRole'
            - !Select [2, !Split [ '/', !Ref AWS::StackId ]]

  AWSQSEKSClusterLogDeliveryRole:
    Type: AWS::IAM::Role
    Properties:
      RoleName: !Join
        - '-'
        - - 'AWSQSLogDeliveryIAMRole'
          - !Select [2, !Split [ '/', !Ref AWS::StackId ]]
      MaxSessionDuration: 8400
      AssumeRolePolicyDocument:
        Version: '2012-10-17'
        Statement:
        - Effect: Allow
          Principal:
            Service:
            - resources.cloudformation.amazonaws.com
            - cloudformation.amazonaws.com
          Action: sts:AssumeRole
      Path: '/'
      Policies:
      - PolicyName: !Join
          - '-'
          - - 'AWSQSLogDeliveryIAMRole'
            - 'policy'
            - !Select [2, !Split [ '/', !Ref AWS::StackId ]]
        PolicyDocument:
          Version: '2012-10-17'
          Statement:
          - Effect: Allow
            Action:
            - logs:CreateLogGroup
            - logs:CreateLogStream
            - logs:DescribeLogGroups
            - logs:DescribeLogStreams
            - logs:PutLogEvents
            - cloudwatch:ListMetrics
            - cloudwatch:PutMetricData
            Resource:
            - '*'
      Tags:
      - Key: Name
        Value: !Join
          - '-'
          - - 'AWSQSLogDeliveryIAMRole'
            - !Select [2, !Split [ '/', !Ref AWS::StackId ]]

  AWSQSEKSClusterActivation:
    Type: AWS::CloudFormation::TypeActivation
    Properties:
      AutoUpdate: true
      ExecutionRoleArn: !GetAtt AWSQSEKSClusterExecutionRole.Arn
      LoggingConfig:
        LogGroupName: !Join
          - '-'
          - - '/aws/cloudformation/registry/AWSQSEKSClusterLogGroup'
            - !Select [2, !Split [ '/', !Ref AWS::StackId ]]
        LogRoleArn: !GetAtt AWSQSEKSClusterLogDeliveryRole.Arn
      PublicTypeArn: !Sub arn:aws:cloudformation:${AWS::Region}::type/resource/408988dff9e863704bcc72e7e13f8d645cee8311/AWSQS-EKS-Cluster

andre-lx avatar Nov 09 '22 17:11 andre-lx