Working with telemetry enablement rules
You can create telemetry enablement rules to automatically configure telemetry collection for your AWS resources. Rules help you standardize telemetry collection across your organization or accounts and ensure consistent monitoring coverage.
Topics
Enablement rule integration with AWS Config
CloudWatch telemetry auditing and configuration integrates with AWS Config to automatically discover resources that match your enablement rule and apply it to your telemetry data collection. When you create an enablement rule, the telemetry configuration creates a corresponding AWS Config recorder. This recorder includes configuration items for the specific resource types you define in the enablement rule.
You can enable Telemetry config at no additional cost.
When you use enablement rules to automatically manage telemetry, AWS Config charges apply based on the number of configuration
items recorded for the resource types you specify in the enablement rule. For more information, see AWS Config pricing
Note
If you have AWS Config already enabled for configuration item recording for the specific resource type, you are not charged again.
Telemetry config uses AWS Config to:
-
Discover resources across your organization or accounts
-
Track telemetry configuration changes
Understanding enablement rule behavior
Telemetry configuration follows specific patterns when evaluating and applying rules:
Enablement rules are evaluated according to a hierarchical pattern. Organizational rules are evaluated first, then rules that apply to organizational units (OUs), and finally rules that apply to individual accounts. Rules at the organizational level provide the baseline required telemetry for your organization. Rules at the OU and account level can collect additional telemetry data, but they cannot collect less telemetry data. If such a rule is created, it will create a rule conflict.
Within each scope (organization, OU, or account), rules must maintain uniqueness based on their resource type, telemetry type, and destination configuration. Duplicate rules trigger a conflict exception. If the same rule exists in different scopes, such as an organization level rule for VPC Flow logs to CloudWatch and an OU level rule for VPC Flow logs, the rule higher in the hierarchy is applied. However, if there are multiple rules in conflict, none of the rules are applied.
For VPC Flow logs, Telemetry Config only creates new flow logs for resources that match the rule scope. It does not delete or impact previously established VPC Flow logs, even if they differ from current rule parameters. For CloudWatch Logs, existing log groups are maintained provided they match the resource pattern.
If you update an enablement rule, only new resources that match the rule adopt the updated configuration, the existing telemetry settings remain unchanged for existing resources. If a resource becomes non-compliant with an existing rule due to manual deletion of telemetry data, the new enablement rule is adopted once the resource is brought back into compliance.
Creating telemetry enablement rules
When you create a telemetry enablement rule, you specify:
-
The scope of the rule (organization, organizational unit, or account)
-
The resource types the rule applies to
-
The telemetry types to enable (metrics, logs, or traces)
-
Optional tags to filter which resources the rule affects
To create a telemetry enablement rule
Open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/
. -
In the navigation pane, choose Telemetry config.
-
Choose the Enablement rules tab.
-
Choose Add rule.
-
For Rule name, enter a name for your rule.
-
For Rule scope, choose one of the following:
-
Organization - Rule applies across your entire AWS Organizations
-
Organizational unit - Rule applies to a specific OU
-
Account - Rule applies to a single account
-
-
For Data source, select the AWS service to configure.
-
For Telemetry type, select the types of telemetry to enable.
-
Optional: Add tags to filter which resources the rule affects.
-
Choose Create rule.
Managing telemetry rules
After creating rules, you can edit or delete them. You can also view which resources each rule affects and monitor rule compliance.
To manage an existing rule
Open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/
. -
In the navigation pane, choose Telemetry config.
-
Choose the Enablement rules tab.
-
Select a rule to view its details or choose one of these actions:
-
Edit - Modify rule settings
-
Delete - Remove the rule
-
Troubleshooting telemetry configuration
This section describes common issues you might encounter when using telemetry configuration and how to resolve them.
Rule conflicts and resolution
When multiple rules apply to the same resource, telemetry configuration resolves conflicts using these priorities:
-
Organizational-level rules take precedence over account-level rules
-
More specific tag matches take precedence over general rules
-
If there are multiple conflicting rules, none of the rules are applied, you must resolve the conflicts first.
Common issues
- Resources not appearing in discovery
-
Verify that:
-
The resource type is supported
-
AWS Config recorder is enabled
-
You have appropriate IAM permissions
-
- Rules not applying automatically
-
Check:
-
Rule scope configuration
-
Tag filters
-
Service-specific considerations
- Amazon VPC Flow Logs
-
When creating flow logs:
-
Uses default pattern /aws/vpc/
vpc-id
if none specified -
Existing customer-created flow logs are preserved
-
Rule updates only affect new flow logs
-