

Now that we have our private key pair, we need to create a new AWS security group for access to and from the container instance Creating A New Security Group If you lose this file, you will need to create a new key pair. Be careful as this is the only time it will download. Add a tag if desired (it’s optional, but best practice).In most cases we’ll be connecting via SSH, so choose PEM format if that’s your tool of choice, or choose PPK if you’re using a PuTTY terminal in Windows.From there, under Network and Security > create a new key pair.Although not required to run an ECS container instance, it’s a good idea to have one on-hand if the Docker (or future ContainerD) runtime is having problems.
#Shemale splunk definition manual#
Creating A New Key PairĬreating a key pair will allow us to access the container instance OS should we need to do any manual configuration. Specifically, we’ll need a key-pair for SSH access to our instances, a viable security group and an S3 storage bucket. Splunk HEC Token: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxĮCS is fairly straightforward to configure, but we’ll be relying on a few components to help manage our EC2 Container Instances.Splunk HEC Index: scratch (the name of the index you configured in your HEC).Splunk HEC server ( Splunk Enterprise): (Splunk Enterprise).AWS Task Execution Role: ecsTaskExecutionRole (the name of the role to run ECS tasks).AWS ECS Instance Role: ecsInstanceRole (the name of the role to run container instances).AWS CloudWatch Log Group: SplunkECS (the name of the log group).

AWS Region: US-East-1 (the region you’re working in).In order to follow the remainder of this post in the series, you will need the following information that we defined in the last part: In this segment in the series we will be focusing on building an ECS cluster, defining tasks and deploying a simple container that routes its application logs to Splunk with Firelens.Īs a quick recap, in part 1 we configured a CloudWatch log group and two IAM roles that will be required for this walkthrough along with an HTTP Event Collector and index within Splunk.
#Shemale splunk definition how to#
In part 1, " Splunking AWS ECS Part 1: Setting Up AWS And Splunk," we focused on understanding what ECS and Fargate are, along with how to get AWS and Splunk ready for log routing to Splunk’s Data-to-Everything platform. W elcome to part 2 of our blog series, where we go through how to forward container logs from Amazon ECS and Fargate to Splunk.
