Note: The console doesn't confirm that settings are saved.įor more information, see Set up CloudWatch API logging using the API Gateway Console. For guidance, choose CLF, JSON, XML, or CSV to see an example in that format. Under Custom Access Logging, do the following to turn on access logging:Ĭhoose the Enable Access Logging check box.įor Access Log Destination ARN, enter the ARN of a CloudWatch log group or an Amazon Kinesis Data Firehose stream.Įnter a Log Format. To add logs to a volume, use the following command: vxassist -g diskgroup -b addlog volume logtypetype nlogsnumber. Or, for WebSocket APIs, choose the Log full message data check box.Ĥ. Or, choose ERROR to generate execution logs only for requests to your API that result in an error.įor REST APIs, choose the Log full requests/responses data check box. On the Logs/Tracing tab, under CloudWatch Settings, do the following to turn on execution logging:Ĭhoose the Enable CloudWatch Logs check box.įor Log level, choose INFO to generate execution logs for all requests. On the Stage Editor pane, choose the Logs/Tracing tab.ģ. Logs panel The logs panel visualization shows log lines from data sources that support logs, such as Elastic, Influx, and Loki. In the API Gateway console, find the Stage Editor for your API.Ģ. Tip: If you use Sign in with Google or Chrome Remote Desktop, you may experience issues if you change your primary email address. Follow the instructions to verify your account. Add the IAM role in the API Gateway consoleġ. Adding Gmail to an existing Google Account. You'll need this Amazon Resource Name (ARN) in the next section.įor more information, see Permissions for CloudWatch Logging. Then, choose the role from the search results.Ĩ. On the Roles pane, in the search bar, enter the name of the role that you created. (Optional) For Role description, edit the description to your preferences.ħ. Under Name, review and create, do the following:įor Role name, enter a meaningful name for the role. The policy has all the required permissions.Ħ. Under Permissions Policies, note that the AWS managed policy AmazonAPIGatewayPushToCloudWatchLogs is selected by default. On the Create role page, do the following:įor Trusted entity type, choose AWS Service.Ĥ. In the AWS Identity and Access Management (IAM) console, in the left navigation pane, choose Roles.Ģ.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |