AWS::Logs::LogGroup
The AWS::Logs::LogGroup
resource specifies a log group. A log group defines common properties for log streams,
such as their retention and access control rules. Each log stream must belong to one log group.
You can create up to 1,000,000 log groups per Region per account. You must use the following guidelines when naming a log group:
-
Log group names must be unique within a Region for an AWS account.
-
Log group names can be between 1 and 512 characters long.
-
Log group names consist of the following characters: a-z, A-Z, 0-9, '_' (underscore), '-' (hyphen), '/' (forward slash), and '.' (period).
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "Type" : "AWS::Logs::LogGroup", "Properties" : { "DataProtectionPolicy" :
Json
, "KmsKeyId" :String
, "LogGroupClass" :String
, "LogGroupName" :String
, "RetentionInDays" :Integer
, "Tags" :[ Tag, ... ]
} }
YAML
Type: AWS::Logs::LogGroup Properties: DataProtectionPolicy:
Json
KmsKeyId:String
LogGroupClass:String
LogGroupName:String
RetentionInDays:Integer
Tags:- Tag
Properties
DataProtectionPolicy
-
Creates a data protection policy and assigns it to the log group. A data protection policy can help safeguard sensitive data that's ingested by the log group by auditing and masking the sensitive log data. When a user who does not have permission to view masked data views a log event that includes masked data, the sensitive data is replaced by asterisks.
For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking.
Required: No
Type: Json
Update requires: No interruption
KmsKeyId
-
The Amazon Resource Name (ARN) of the AWS KMS key to use when encrypting log data.
To associate an AWS KMS key with the log group, specify the ARN of that KMS key here. If you do so, ingested data is encrypted using this key. This association is stored as long as the data encrypted with the KMS key is still within CloudWatch Logs. This enables CloudWatch Logs to decrypt this data whenever it is requested.
If you attempt to associate a KMS key with the log group but the KMS key doesn't exist or is deactivated, you will receive an
InvalidParameterException
error.Log group data is always encrypted in CloudWatch Logs. If you omit this key, the encryption does not use AWS KMS. For more information, see Encrypt log data in CloudWatch Logs using AWS Key Management Service
Required: No
Type: String
Pattern:
^arn:[a-z0-9-]+:kms:[a-z0-9-]+:\d{12}:(key|alias)/.+\Z
Maximum:
256
Update requires: No interruption
LogGroupClass
-
Specifies the log group class for this log group. There are two classes:
-
The
Standard
log class supports all CloudWatch Logs features. -
The
Infrequent Access
log class supports a subset of CloudWatch Logs features and incurs lower costs.
For details about the features supported by each class, see Log classes
Required: No
Type: String
Allowed values:
STANDARD | INFREQUENT_ACCESS
Update requires: Updates are not supported.
-
LogGroupName
-
The name of the log group. If you don't specify a name, AWS CloudFormation generates a unique ID for the log group.
Required: No
Type: String
Pattern:
^[.\-_/#A-Za-z0-9]{1,512}\Z
Minimum:
1
Maximum:
512
Update requires: Replacement
RetentionInDays
-
The number of days to retain the log events in the specified log group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1096, 1827, 2192, 2557, 2922, 3288, and 3653.
To set a log group so that its log events do not expire, use DeleteRetentionPolicy.
Required: No
Type: Integer
Allowed values:
1 | 3 | 5 | 7 | 14 | 30 | 60 | 90 | 120 | 150 | 180 | 365 | 400 | 545 | 731 | 1096 | 1827 | 2192 | 2557 | 2922 | 3288 | 3653
Update requires: No interruption
-
An array of key-value pairs to apply to the log group.
For more information, see Tag.
Required: No
Type: Array of Tag
Update requires: No interruption
Return values
Ref
When you pass the logical ID of this resource to the intrinsic Ref
function, Ref
returns the resource name.
For more information about using the Ref
function, see Ref
.
Fn::GetAtt
The Fn::GetAtt
intrinsic function returns a value for a specified attribute of this type. The following are the available attributes and sample return values.
For more information about using the Fn::GetAtt
intrinsic function, see Fn::GetAtt
.
Arn
-
The ARN of the log group, such as
arn:aws:logs:us-west-1:123456789012:log-group:/mystack-testgroup-12ABC1AB12A1:*
Examples
Create a log group
The following example creates a log group that retains events for 7 days.
JSON
"myLogGroup": { "Type": "AWS::Logs::LogGroup", "Properties": { "RetentionInDays": 7 } }
YAML
myLogGroup: Type: AWS::Logs::LogGroup Properties: RetentionInDays: 7
Create a log group with a data protection policy
The following example creates a log group that uses a data protection policy to mask email addresses, and send audit findings to CloudWatch Logs, Firehose, and Amazon S3.
JSON
"TestLogGroupDescription": { "Type": "AWS::Logs::LogGroup", "Properties": { "LogGroupName": "my-log-group", "DataProtectionPolicy": { "Name": "data-protection-policy", "Description": "test description", "Version": "2021-06-01", "Statement": [{ "Sid": "audit-policy test", "DataIdentifier": [ "arn:aws:dataprotection::aws:data-identifier/EmailAddress", "arn:aws:dataprotection::aws:data-identifier/DriversLicense-US" ], "Operation": { "Audit": { "FindingsDestination": { "CloudWatchLogs": { "LogGroup": "EXISTING_LOG_GROUP_IN_YOUR_ACCOUNT" }, "Firehose": { "DeliveryStream": "EXISTING_STREAM_IN_YOUR_ACCOUNT" }, "S3": { "Bucket": "EXISTING_BUCKET" } } } } }, { "Sid": "redact-policy", "DataIdentifier": [ "arn:aws:dataprotection::aws:data-identifier/EmailAddress", "arn:aws:dataprotection::aws:data-identifier/DriversLicense-US" ], "Operation": { "Deidentify": { "MaskConfig": {} } } } ] } } }
YAML
TestLogGroupDescription: Type: AWS::Logs::LogGroup Properties: LogGroupName: my-log-group DataProtectionPolicy: Name: data-protection-policy Description: test description Version: '2021-06-01' Statement: - Sid: audit-policy test DataIdentifier: - arn:aws:dataprotection::aws:data-identifier/EmailAddress - arn:aws:dataprotection::aws:data-identifier/DriversLicense-US Operation: Audit: FindingsDestination: CloudWatchLogs: LogGroup: EXISTING_LOG_GROUP_IN_YOUR_ACCOUNT Firehose: DeliveryStream: EXISTING_STREAM_IN_YOUR_ACCOUNT S3: Bucket: EXISTING_BUCKET - Sid: redact-policy DataIdentifier: - arn:aws:dataprotection::aws:data-identifier/EmailAddress - arn:aws:dataprotection::aws:data-identifier/DriversLicense-US Operation: Deidentify: MaskConfig: {}