- AWS Distro versioning scheme FAQ
- Compliance and Patching
- Consuming AWS for Fluent Bit versions
- Debugging Guide
- Use Case Guide
- Public Images
- Plugins
- Using the AWS Plugins outside of a container
- Running aws-for-fluent-bit Windows containers
- Development
- Fluent Bit Examples
- License
The version of the AWS for Fluent Bit image is not linked to the version of Fluent Bit which it contains.
What does the version number signify?
We use the standard major.minor.patch
versioning scheme for our image, AKA Semantic Versioning. The initial release with this versioning scheme is 2.0.0
. An update to the patch version indicates backwards compatible bug fixes, a minor version change indicates new backwards compatible functionality, and a major version change indicates backwards incompatible changes.
The AWS for Fluent Bit image includes the following contents:
- A base image (currently Amazon Linux or Windows Server Core 2019 or Windows Server Core 2022)
- Fluent Bit
- Several Fluent Bit Go Plugins
A change in any one of these pieces would lead to a change in our version number.
What about the 1.x image tags in your repositories?
The AWS for Fluent Bit image was launched in July 2019. Between July and October of 2019 we simply versioned the image based on the version of Fluent Bit that it contained. During this time we released 1.2.0
, 1.2.2
and 1.3.2
.
The old versioning scheme was simple and it made it clear which version of Fluent Bit our image contained. However, it had a serious problem- how could we signify that we had changed the other parts of the image? If we did not update Fluent Bit, but updated one of the plugins, how would we signify this in a new release? There was no answer- we could only release an update when Fluent Bit released a new version. We ultimately realized this was unacceptable- bug fixes or new features in our plugins should not be tied to the Fluent Bit release cadence.
Thus, we moved to the a new versioning scheme. Because customers already are relying on the 1.x
tags, we have left them in our repositories. The first version with the new scheme is 2.0.0
. From now on we will follow semantic versioning- but the move from 1.3.2
did not follow semantic versioning. There are no backwards incompatible changes between aws-for-fluent-bit:1.3.2
and aws-for-fluent-bit:2.0.0
. Our release notes for 2.0.0
clearly explain the change.
Does this mean you are diverging from fluent/fluent-bit?
No. We continue to consume Fluent Bit from its main repository. We are not forking Fluent Bit.
Q: Is AWS for Fluent Bit HIPAA Compliant?
Fluent Bit can be used in a HIPAA compliant matter to send logs to AWS, even if the logs contain PHI. Please see the call outs in the AWS HIPAA white paper for ECS.
Q: What is the policy for patching AWS for Fluent Bit for vulnerabilities, CVEs and image scan findings?
AWS for Fluent Bit uses ECR image scanning in its release pipeline and any scan that finds high or critical vulnerabilities will block a release: scripts/publish.sh
If you find an issue from a scan on our latest images please follow the reporting guidelines below and we will work quickly to introduce a new release. To be clear, we do not patch existing images, we just will release a new image without the issue. The team uses Amazon ECR Basic image scanning and Amazon ECR Enhanced scanning powered by AWS Inspector as the primary source of truth for whether or not the image contains a vulnerability in a dependency.
If your concern is about a vulnerability in the Fluent Bit upstream (github.com/fluent/fluent-bit open source code), please let us know as well. However, fixing upstream issues requires additional work and time because we must work closely with upstream maintainers to commit a fix and cut an upstream release, and then we can cut an AWS for Fluent Bit release.
Q: How do I report security disclosures?
If you think you’ve found a potentially sensitive security issue, please do not post it in the Issues on GitHub. Instead, please follow the instructions here or email AWS security directly at [email protected].
Our image repos contain the following types of tags, which are explained in the sections below:
latest
: The most recently released image version. We do not recommend deploying this to production environments ever, see Guidance on consuming versions.Version number tag
: Each release has a version number, for example2.28.4
. These are the only tags we recommend consuming in production environments: Guidance on consuming versions.stable
: Some time after a version is released, it may be designated as the latest stable. See Latest stable version and Guidance on consuming versions.
Types of tests we run
- Simple integration tests: Short running tests of the AWS output plugins that send log records and verify that all of them were received correctly formatted at the destination.
- Load Tests: Test Fluent Bit AWS output plugins at various throughputs and check for log loss, the results are posted in our release notes: https://github.com/aws/aws-for-fluent-bit/releases
- Long running stability tests: Highly parallel tests run in Amazon ECS for the AWS output plugins using the aws/firelens-datajet project. These tests simulate real Fluent Bit deployments and use cases to test for bugs that crashes.
Latest release testing bar
- Simple integration tests: Must fully pass with all log events received properly formatted at the destination.
- Load Tests: Must pass the thresholds here. Results are posted in our release notes: https://github.com/aws/aws-for-fluent-bit/releases
- Long running stability tests: No crashes observed for at least 1 day.
CVE Patch release testing bar
- Simple integration tests: Must fully pass with all log events received properly formatted at the destination.
- Load Tests: Must pass the thresholds here. Results are posted in our release notes: https://github.com/aws/aws-for-fluent-bit/releases
We do not run our long running stability tests for CVE patches. This is because the goal is to get the CVE patch out as quickly as possible, and because CVE patch releases never include Fluent Bit code changes. CVE patch releases only include base image dependency upgrades. If there is ever a CVE in the Fluent Bit code base itself, the patch for it would be considered a bug fix that might introduce instability and it would undergo the normal latest release testing.
Latest stable release testing bar
For a version to be made the latest stable
, it must already have been previously released as the latest release. Thus it will have already passed the testing bar noted above for latest
.
In addition, our stable release undergoes additional testing:
- Long running stability tests: The version undergoes and passes these tests for at least 2 weeks. After the version is promoted to stable we continue to run the long running stability tests, and may roll back the stable designation if issues later surface.
Our latest stable version is the most recent version that we have high confidence is stable for AWS use cases. We recommend using the stable version number in your prod deployments; see Guidance on consuming versions
The latest stable version is marked with the tag stable
/windowsservercore-stable
. The version number that is currently designated as the latest stable can always be found in the AWS_FOR_FLUENT_BIT_STABLE_VERSION file in the root of this repo.
There is no guarantee that stable
has no issues- stable simply has a higher testing bar than our latest releases. The stable
tag can be downgraded and rolled back to the previous stable if new test results or customer bug reports surface issues. This has occurred in the past*. Consequently, we recommend locking to a specific version tag and informing your choice of version using our current stable designation.
Prior to being designated as the latest stable, a version must pass the following criteria:
- It has been out for at least 2 weeks or is a CVE patch with no Fluent Bit changes. Stable designation is based on the Fluent Bit code in the image. A version released for CVE patches can be made stable if the underlying if the underlying Fluent Bit code is already designated as stable.
- No bugs have been reported in Fluent Bit which we expect will have high impact for AWS customers. This means bugs in the components that are most frequently used by AWS customers, such as the AWS outputs or the tail input.
- The version has passed our long running stability tests for at least 2 weeks. The version would have already passed our simple integration and load tests when it was first released as the latest image.
Please read our CVE patching policy.
The stable designation is for the Fluent Bit code contents of the image, not CVE scan results for dependencies installed in the image. We will upgrade a CVE patch to be the latest stable if it contains no Fluent Bit code changes compared to the previous latest stable.
Our release notes call out the key AWS changes in each new version.
We recommend that you only consume non-stable releases in your test/pre-prod stages. Consuming the latest
tag directly is widely considered to be an anti-pattern in the software industry.
We strongly recommend that you always lock deployments to a specific immutable version tag, rather than using our stable
or latest
tags. Using the stable
or latest
tag directly in prod has the following downsides:
- Difficulty in determining which version was deployed: If you experience an issue, you will need to check the Fluent Bit log output to determine which specific version tag was deployed. This is because the
stable
andlatest
tags are mutable and change over time. - Mixed deployments: If you are in the middle of a deployment when we release an update to the
stable
orlatest
immutable tags, some of your deployment may have deployed the previous version, and the rest will deploy the new version.
The best practice for consuming AWS for Fluent Bit is to check the AWS_FOR_FLUENT_BIT_STABLE_VERSION file and lock your prod deployments to that specific version tag. For example, if the current stable is 2.28.4
, your deployment should use public.ecr.aws/aws-observability/aws-for-fluent-bit:2.28.4
not public.ecr.aws/aws-observability/aws-for-fluent-bit:stable
.
A set of tutorials on use cases that Fluent Bit can solve.
Each release updates the latest
tag and adds a tag for the version of the image. The stable
tag is also available which marks a release as the latest stable version.
For Windows images, we update the windowsservercore-latest
tag and add a tag as <VERSION>-windowsservercore
. The stable tag is available as windowsservercore-stable
. We update all the supported versions each month when Microsoft releases the latest security
patches for Windows.
Note: Deploying latest
/windowsservercore-latest
to prod without going through a test stage first is not recommended.
AWS for Fluent Bit currently distributes container images for arm64 and amd64 CPU architectures. Our images all use mutli-archictecture tags. For example, this means that if you pull the latest
tag on a Graviton instance, you would get the arm64 image build.
For Windows, we release images only for amd64 CPU architecture of the following Windows releases-
- Windows Server 2019
- Windows Server 2022
The init
tags indicate that an image contains init process and supports multi-config. Init tag is used in addition to our other tags, e.g. aws-for-fluent-bit:init-latest
means this is a latest released image supports multi-config. For more information about the usage of multi-config please see our use case guide and FireLens example.
Note: Windows images with init tag are not available at the moment.
As of 2.0.0, there are SSM Public Parameters which allow you to see available versions. These parameters are available in every region that the image is available in. Any AWS account can query these parameters.
To see a list of available version tags, run the following command:
aws ssm get-parameters-by-path --path /aws/service/aws-for-fluent-bit/ --query 'Parameters[*].Name'
Example output:
[
"/aws/service/aws-for-fluent-bit/latest"
"/aws/service/aws-for-fluent-bit/windowsservercore-latest"
"/aws/service/aws-for-fluent-bit/2.0.0"
"/aws/service/aws-for-fluent-bit/2.0.0-windowsservercore"
]
To see the ECR repository ID for a given image tag, run the following:
$ aws ssm get-parameter --name /aws/service/aws-for-fluent-bit/2.0.0
{
"Parameter": {
"Name": "/aws/service/aws-for-fluent-bit/2.0.0",
"Type": "String",
"Value": "906394416424.dkr.ecr.us-east-1.amazonaws.com/aws-for-fluent-bit:2.0.0",
"Version": 1,
"LastModifiedDate": 1539908129.759,
"ARN": "arn:aws:ssm:us-west-2::parameter/aws/service/aws-for-fluent-bit/2.0.0"
}
}
You can use these SSM Parameters as parameters in your CloudFormation templates.
Parameters:
FireLensImage:
Description: Fluent Bit image for the FireLens Container
Type: AWS::SSM::Parameter::Value<String>
Default: /aws/service/aws-for-fluent-bit/latest
You should lock your deployments to a specific version tag. We guarantee that these tags will be immutable- once they are released the will not change. Windows images will be updated each month to include the latest security patches in the base layers but the contents of the image will not change in a tag.
Our images are available in Amazon ECR Public Gallery. We recommend our customers to download images from this public repo. You can get images with different tags by following command:
docker pull public.ecr.aws/aws-observability/aws-for-fluent-bit:<tag>
For example, you can pull the image with latest version by:
docker pull public.ecr.aws/aws-observability/aws-for-fluent-bit:latest
If you see errors for image pull limits, or get the following error:
Error response from daemon: pull access denied for public.ecr.aws/amazonlinux/amazonlinux, repository does not exist or may require 'docker login': denied: Your authorization token has expired. Reauthenticate and try again.
Then try log into public ECR with your AWS credentials:
aws ecr-public get-login-password --region us-east-1 | docker login --username AWS --password-stdin public.ecr.aws
You can check the Amazon ECR Public official doc for more details.
We also provide images in Amazon ECR for high availability. These images are available in almost every AWS region, included AWS Gov Cloud.
The official way to find the ECR image URIs for your region is to use the SSM Parameters. In your region, run the following command:
aws ssm get-parameters-by-path --path /aws/service/aws-for-fluent-bit/
Deploying AWS for Fluent Bit debug images can help the AWS team troubleshoot an issue. If you experience a bug, especially a crash/SIGSEGV issue, then please consider deploying the debug version of the image. After a crash, the debug image can print out a stacktrace and upload a core dump to S3. See our debugging guide for more info on using debug images.
For debug images, we update the debug-latest
tag and add a tag as debug-<Version>
.
We currently bundle the following projects in this image:
- amazon-kinesis-firehose-for-fluent-bit
- amazon-cloudwatch-logs-for-fluent-bit
- amazon-kinesis-streams-for-fluent-bit
You can use the AWS Fluent Bit plugins with td-agent-bit.
We provide a tutorial on using SSM to configure instances with td-agent-bit and the plugins.
You can run aws-for-fluent-bit
Windows containers using the image tags as specified under Windows Images section. These are distributed as multi-arch images with the manifests for the supported Windows releases as specified above.
For more details about running Fluent Bit Windows containers in Amazon EKS, please visit our blog post.
For more details about running Fluent Bit Windows containers in Amazon ECS, please visit our blog post. For running Fluent Bit as a Amazon ECS Service using daemon
scheduling strategy, please visit our Amazon ECS tutorial. For more details about using the AWS provided default configurations for Amazon ECS, please visit our documentation.
Note: There is a known issue with networking failure when running Fluent Bit in Windows containers on default
container network. Check out the guidance in our debugging guide for a workaround to this issue.
Use make release
to build the image.
To run the integration tests, run make integ-dev
. The make integ-dev
command will run the integration tests for all of our plugins-
kinesis streams, kinesis firehose, and cloudwatch.
To run integration tests separately, execute make integ-cloudwatch
or make integ-kinesis
or make integ-firehose
.
Documentation on GitHub steps for releases.
You can build a version of the image with code in your GitHub fork. To do so, you must need to set the following environment variables.
Otherwise, you will see an error message like the following one:
fatal: repository '/kinesis-streams' or '/kinesis-firehose' or '/cloudwatch' does not exist.
Set the following environment variables for CloudWatch:
export CLOUDWATCH_PLUGIN_CLONE_URL="Your GitHub fork clone URL"
export CLOUDWATCH_PLUGIN_BRANCH="Your branch on your fork"
Or for Kinesis Streams:
export KINESIS_PLUGIN_CLONE_URL="Your GitHub fork clone URL"
export KINESIS_PLUGIN_BRANCH="Your branch on your fork"
Or for Kinesis Firehose:
export FIREHOSE_PLUGIN_CLONE_URL="Your GitHub fork clone URL"
export FIREHOSE_PLUGIN_BRANCH="Your branch on your fork"
Then run make cloudwatch-dev
or make kinesis-dev
or make firehose-dev
to build the image with your changes.
To run the integration tests on your code, execute make integ-cloudwatch-dev
or make integ-kinesis-dev
or make integ-firehose-dev
.
Check out Fluent Bit examples from our amazon-ecs-firelens-examples repo.
This project is licensed under the Apache-2.0 License.