Friday, September 19, 2025

CloudWatch Logs Aggregation (Across Multiple AWS Accounts & Regions) | Overview.


Amazon CloudWatch Logs Aggregation (Across Multiple AWS Accounts & Regions) -  Overview.

Scope:

  • Intro,
  • Methods for Aggregating Logs,
  • Key Considerations,
  • Why Aggregation is Needed,
  • Core Approaches,
  • CloudWatch Logs Subscriptions  Central Kinesis / Lambda / Firehose,
  • CloudWatch Logs Cross-Account & Cross-Region Sharing (Centralized Console View),
  • Architecture Patterns,
  • Security Considerations,
  • Cost Management,
  • Best Practices,
  • Final thoughts.

Intro:

    • Amazon CloudWatch logs aggregation involves centralizing log data from various sources for analysis and monitoring. 
    • The primary methods involve using CloudWatch Logs Insights, custom log group configurations, and embedded metric format for generating metrics from logs. 
    • Here’s twtech overview of CloudWatch Logs aggregation across multiple AWS accounts and regions, including patterns.
Methods for Aggregating Logs
CloudWatch Logs Insights: 
    • This service allows twtech to interactively search, filter, and analyze log data across multiple log groups using a specialized query language (Logs Insights QL). 
    • twtech can run queries with aggregation functions (e.g., stats count()avg()sum()) to derive meaningful insights from a large volume of logs.
Custom Log Group Consolidation: 
    • For services like AWS Lambda, where each function might create its own log group by default, twtech can configure multiple functions to send their logs to a single, custom log group. 
    • This approach simplifies monitoring and troubleshooting by providing a centralized view.
Embedded Metric Format (EMF): 
    • twtech can embed custom metrics within its log events. 
    • CloudWatch automatically extracts these metrics, enabling twtech to treat specific data points within logs as standard CloudWatch metrics and aggregate them across different dimensions for monitoring and alarming purposes.
Subscription Filters and External Destinations: 
    • For more complex, cross-account, or cross-Region aggregation, twtech can use subscription filters to stream log data to external destinations like Amazon Kinesis Data Streams or Amazon Kinesis Data Firehose. 
    • From there, the data can be further processed and aggregated into other analytics platforms or storage solutions.
Contributor Insights: 
    • This feature helps analyze log data to identify top contributors to a specific log pattern (e.g., specific PetId causing high latency). 
    • It automatically aggregates data based on defined rules and dimensions. 
Key Considerations

Log Retention: 
    • Configure the log retention settings for twtech log groups to manage storage costs and compliance requirements.
Log Class:
    •  Choose between the Standard and Infrequent Access log classes based on twtech access patterns and cost optimization needs.
Cross-Account Observability: 
    • CloudWatch supports cross-account and cross-Region observability, allowing twtech to monitor and query logs from centralized monitoring accounts. 

1. Why Aggregation is Needed

    • Centralized Security & Compliance Collect logs from all accounts/regions into a central location (audit/compliance account).
    • Cost Optimization Avoid running duplicate analytics pipelines per account.
    • Visibility Easier to correlate logs across applications, services, and regions.

2. Core Approaches

A. CloudWatch Logs Subscriptions Central Kinesis / Lambda / Firehose

  • Log subscription filters can stream logs in near real-time to:
    • Amazon Kinesis Data Streams
    • Amazon Kinesis Data Firehose (for S3, OpenSearch, or Splunk)
    • AWS Lambda (custom processing)
  • Multi-account/region setup:
    • Each source account/region has subscription filters pointing to a central Firehose or stream in the Log Archive account.
    • Requires Cross-Account IAM Role + Resource Policies on the destination.
  • Pros: Near real-time, scalable, supports analytics & search.
  • ⚠️ Cons: Setup complexity, cost of streaming + storage.

B. CloudWatch Logs Cross-Account & Cross-Region Sharing (Centralized Console View)

  • With CloudWatch cross-account observability, twtech can link source accounts to a monitoring account.
  • Benefits:
    • View logs from all linked accounts in one place (CloudWatch console or APIs).
    • No data duplication – logs stay in the source account.
  • Pros: Simple, no duplication, unified console.
  • ⚠️ Cons: Limited for centralized retention/compliance (logs still live in source).

C. Export to S3 Central Data Lake

  • CloudWatch Logs Export Task or via Firehose S3 (per account/region).
  • Then consolidate with:
    • S3 Replication to central bucket (log archive).
    • AWS Lake Formation / Athena / Glue query across logs.
  • Pros: Cheap storage, good for compliance and long-term retention.
  • ⚠️ Cons: Export task is batch, not real-time; Firehose S3 adds cost.

D. AWS Organizations + Centralized Logging (Control Tower/AWS Security Reference Architecture)

  • AWS Security Reference Architecture (SRA) recommends:
    • Central Log Archive account.
    • Forward all logs (CloudTrail, VPC Flow Logs, App Logs) S3 in Log Archive account.
    • Use Organization Trail for CloudTrail logs across accounts.
    • For CloudWatch Logs: Subscriptions Firehose S3 (central).

3. Architecture Patterns

Pattern 1 – Real-Time Central Aggregation

    1. CloudWatch Logs in Account/Region.
    2. Subscription Filter Kinesis Firehose (Cross-account role).
    3. Firehose S3 / OpenSearch in central account.
    4. (Optional) Use Athena or OpenSearch for search & analytics.

Pattern 2 – Centralized Observability (No Duplication)

    1. Enable CloudWatch Cross-Account Observability.
    2. Monitoring account links to source accounts.
    3. Operators view & query logs from all accounts/regions in one place.

Pattern 3 – Compliance Data Lake

    1. Logs collected in CloudWatch.
    2. Periodic Export (or Firehose S3).
    3. S3 replication Log Archive Account.
    4. Glue Data Catalog + Athena queries for compliance reports.


4. Security Considerations

    • Least Privilege IAM Roles for cross-account subscription delivery.
    • Encryption at Rest:
      • CloudWatch Logs KMS CMKs.
      • Firehose S3 (KMS or SSE-S3).
    • GuardDuty & Security Hub
    • GuardDuty & Security Hub integration for monitoring log flow failures.
    • Ensure log delivery retry policies are in place (Firehose retries).

5. Cost Management

  • CloudWatch Logs ingestion + storage costs can grow fast.
  • Consider:
    • Subscriptions S3 Glacier for long-term archival.
    • Log Level Filtering before sending to central system.
    • Tiered storage: Recent logs in CloudWatch, older logs in S3.

6. Best Practices

    • Use a Log Archive account for compliance (AWS SRA guidance).
    • Use AWS Control Tower or Landing Zone blueprints if available.
    • Standardize log formats (JSON preferred).
    • Use Athena partitions (e.g., account_id, region, service) for cost-effective queries.
    • Automate setup with CloudFormation StackSets / Terraform for multi-account rollout.

Final thoughts:

    • For real-time monitoring & analytics, use CloudWatch Logs Subscriptions Firehose Central Account (S3/OpenSearch).
    • For central viewing only, use CloudWatch Cross-Account Observability.
    • For compliance/long-term retention, use S3 aggregation (log archive account).



No comments:

Post a Comment

Databases Explained & Use Cases with (Flash Card) | Overview.

Databases Explained  & Use Cases ( Flash Cards)   - Overview. A database is a structured collection of digital information designed f...