LogExporter
Export logs to S3
This task is designed to send logs to S3.
type: "io.kestra.plugin.ee.aws.s3.LogExporter"
Ship logs to AWS S3
id: log_shipper
namespace: system
tasks:
- id: log_export
type: io.kestra.plugin.ee.core.log.LogShipper
logLevelFilter: INFO
batchSize: 1000
lookbackPeriod: P1D
logExporters:
- id: S3LogExporter
type: io.kestra.plugin.ee.aws.s3.LogExporter
accessKeyId: "{{ secret('AWS_ACCESS_KEY_ID') }}"
secretKeyId: "{{ secret('AWS_SECRET_KEY_ID') }}"
region: "{{ vars.region }}"
format: JSON
bucket: logbucket
logFilePrefix: kestra-log-file
maxLinesPerFile: 1000000
triggers:
- id: daily
type: io.kestra.plugin.core.trigger.Schedule
cron: "@daily"
YES
S3 Bucket to upload logs files.
The bucket where log files are going to be imported
NO
^[a-zA-Z0-9][a-zA-Z0-9_-]*
1
YES
AWS region with which the SDK should communicate.
YES
Access Key Id in order to connect to AWS.
If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YES
1000
The chunk size for every bulk request.
YES
The endpoint with which the SDK should communicate.
This property allows you to use a different S3 compatible storage backend.
YES
JSON
ION
JSON
Format of the exported files
The format of the exported files
YES
kestra-log-file
Prefix of the log files
The prefix of the log files name. The full file name will be logFilePrefix-localDateTime.json/ion
YES
100000
Maximum number of lines per file
The maximum number of lines per file
YES
Secret Key Id in order to connect to AWS.
If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YES
AWS session token, retrieved from an AWS token service, used for authenticating that this user has received temporary permissions to access a given resource.
If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YES
The AWS STS endpoint with which the SDKClient should communicate.
YES
AWS STS Role.
The Amazon Resource Name (ARN) of the role to assume. If set the task will use the StsAssumeRoleCredentialsProvider
. If no credentials are defined, we will use the default credentials provider chain to fetch credentials.
YES
AWS STS External Id.
A unique identifier that might be required when you assume a role in another account. This property is only used when an stsRoleArn
is defined.
YES
PT15M
duration
AWS STS Session duration.
The duration of the role session (default: 15 minutes, i.e., PT15M). This property is only used when an stsRoleArn
is defined.
YES
AWS STS Session name.
This property is only used when an stsRoleArn
is defined.