New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove AWS CloudWatch logs via S3 option #6247
Remove AWS CloudWatch logs via S3 option #6247
Conversation
🌐 Coverage report
|
The "Changelog" modal is available from version 8.8.x, so we would need to bump the Kibana version to be able to see it. It was not possible to backport it (see PR, we are not shipping more minors for 8.7). Should I bump the whole AWS package and ship this from 8.8.0? |
💚 Build Succeeded
|
Hi! We just realized that we haven't looked into this PR in a while. We're sorry! We're labeling this issue as |
Hi! We just realized that we haven't looked into this PR in a while. We're sorry! We're labeling this issue as |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Package aws - 2.0.0 containing this change is available at https://epr.elastic.co/search?package=aws |
* Remove AWS CloudWatch logs via S3 option * Update changelog entry * Make Changelog more detailed for users that might be using the S3 datastream --------- Co-authored-by: kaiyan-sheng <kaiyan.sheng@elastic.co>
What does this PR do?
It removes the option to collect logs using aws-s3 input marked as deprecated.
Behavior on upgrade:
The option disappears after the upgrade, the datastream remains but stops collecting data.
The option remains, since the policy is unchanged it keeps functioning and ingesting data
Sidenote: This input configuration only included SQS queue ARN input field requiring the whole CloudWatch-S3-SQS chain to be configured i.e. there was no option to provide a standalone S3 bucket.
Checklist
changelog.yml
file.Author's Checklist
How to test this PR locally
Check that the "Collect Cloudwatch Logs via S3 options" is not shown anymore when the policy is upgraded, and the integration works as expected.
Screenshots