Releases: aws/aws-for-fluent-bit
AWS for Fluent Bit 2.23.3
2.23.3
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.15
- Amazon CloudWatch Logs for Fluent Bit 1.7.0
- Amazon Kinesis Streams for Fluent Bit 1.9.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Same as 2.23.2
, this release includes the following fix for AWS customers that we are working on getting accepted upstream:
- Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
New Tool:
- firelens-datajet is a holistic log/metric routing software test tool made to flexibly send test data to Fluent Bit in a repeatable, reliable, and portable manner. Create test configuration JSONs that modularly connect test data generators to data senders, customize data generation rate, send data in parallel over various ingestion routes, and mock log router destinations.
We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit
under different input load.
plugin | 20 MB/s | 25 MB/s | 30 MB/s | |
---|---|---|---|---|
kinesis_firehose | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | 0%(1309) | ✅ | 0%(468) | |
kinesis_streams | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | 0%(484) | ✅ | 0%(1341) | |
s3 | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | ✅ | ✅ | ✅ |
plugin | 1 MB/s | 2 MB/s | 3 MB/s | |
---|---|---|---|---|
cloudwatch_logs | Log Loss | ✅ | 0%(1308) | 0%(2678) |
Log Duplication | ✅ | 3%(40280) | 4%(51357) |
Note:
- The green check ✅ in the table means no log loss or no log duplication.
- Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
- CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
- Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.
AWS for Fluent Bit 2.23.2
2.23.2
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.14
- Amazon CloudWatch Logs for Fluent Bit 1.7.0
- Amazon Kinesis Streams for Fluent Bit 1.9.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Compared to 2.23.1
this release adds:
- Enhancement - Mitigate throttling issue on log group in cloudwatch_logs plugin fluentbit:4826
Same as 2.23.1
, this release includes the following fix for AWS customers that we are working on getting accepted upstream:
- Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit
under different input load.
plugin | 20 MB/s | 25 MB/s | 30 MB/s | |
---|---|---|---|---|
kinesis_firehose | Log Loss | ✅ | 0%(341) | ✅ |
Log Duplication | ✅ | ✅ | 0%(500) | |
kinesis_streams | Log Loss | ✅ | 0%(3824) | ✅ |
Log Duplication | 0%(1819) | ✅ | ✅ | |
s3 | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | ✅ | ✅ | ✅ |
plugin | 1 MB/s | 2 MB/s | 3 MB/s | |
---|---|---|---|---|
cloudwatch_logs | Log Loss | 2%(17084) | 0%(1671) | 0%(2678) |
Log Duplication | ✅ | 7%(77539) | 6%(80560) |
Note:
- The green check ✅ in the table means no log loss or no log duplication.
- Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
- CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
- Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.
AWS for Fluent Bit 2.23.1
2.23.1
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.13
- Amazon CloudWatch Logs for Fluent Bit 1.7.0
- Amazon Kinesis Streams for Fluent Bit 1.9.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Same as 2.23.0
, this release includes the following fix for AWS customers that we are working on getting accepted upstream:
- Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
Important Note:
- Two security vulnerability were found in amazonlinux which we use as base image to our
aws-for-fluent-bit
image- ALAS-2022-1764 and ALAS-2022-1766. This new image will be based on an updated version of amazonlinux that resolves these CVEs.
We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit
under different input load.
plugin | 20 MB/s | 25 MB/s | 30 MB/s | |
---|---|---|---|---|
kinesis_firehose | Log Loss | ✅ | 0%(16) | 0%(1630) |
Log Duplication | ✅ | ✅ | 0%(256) | |
kinesis_streams | Log Loss | ✅ | ✅ | 0%(15) |
Log Duplication | ✅ | 0%(1831) | 0%(485) | |
s3 | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | ✅ | ✅ | ✅ |
plugin | 1 MB/s | 2 MB/s | 3 MB/s | |
---|---|---|---|---|
cloudwatch_logs | Log Loss | ✅ | 0%(332) | 0%(2307) |
Log Duplication | ✅ | 6%(80560) | 3%(51357) |
Note:
- The green check ✅ in the table means no log loss or no log duplication.
- Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
- CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
- Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.
AWS for Fluent Bit 2.23.0
2.23.0
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.13
- Amazon CloudWatch Logs for Fluent Bit 1.7.0
- Amazon Kinesis Streams for Fluent Bit 1.9.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Compared to 2.22.0
this release adds:
- Feature - Add timeout config for AWS SDK Go HTTP calls kinesis:178
- Enhancement - Migrate AWS plugins to performant 2.25.0-mbedtls base64 implementation fluentbit:4422
- Bug - Fix message loss issue using concurrency feature with 0 retries kinesis:179
Compared to 2.22.0
this release deletes the following fix which has been covered in new enhancement:
- Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110
Same as 2.22.0
, this release includes the following fix for AWS customers that we are working on getting accepted upstream:
- Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit
under different input load.
plugin | 20Mb/s | 25Mb/s | 30Mb/s | |
---|---|---|---|---|
kinesis_firehose | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | ✅ | ✅ | 0%(1064) | |
kinesis_streams | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | ✅ | ✅ | ✅ | |
s3 | Log Loss | ✅ | ✅ | ✅ |
Log Duplication | ✅ | ✅ | ✅ |
plugin | 1Mb/s | 2Mb/s | 3Mb/s | |
---|---|---|---|---|
cloudwatch_logs | Log Loss | ✅ | 0%(332) | 0%(2678) |
Log Duplication | ✅ | 6%(71497) | 2%(39273) |
Note:
- The green check ✅ in the table means no log loss or no log duplication.
- Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
- CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
- Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.
AWS for Fluent Bit 2.22.0
2.22.0
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.12
- Amazon CloudWatch Logs for Fluent Bit 1.7.0
- Amazon Kinesis Streams for Fluent Bit 1.8.1
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Compared to 2.21.6
this release adds:
- Feature - The multiline filter now fully supports key ECS multiline log use cases using regular expressions aws-for-fluent-bit:100
- Feature - Add support for external_id in AWS output plugins aws-for-fluent-bit:171
- Bug - Fix truncation issue after compression kinesis:183
Same as 2.21.6
, this release includes the following fix for AWS customers that has been accepted by upstream:
- Bug - Fix return value from
tls_net_read
fluentbit:4098
Same as 2.21.6
, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110 - Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
AWS for Fluent Bit 2.21.6
2.21.6
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.11
- Amazon CloudWatch Logs for Fluent Bit 1.6.4
- Amazon Kinesis Streams for Fluent Bit 1.8.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Compared to 2.21.5 this release adds:
- Go version upgrade to 1.17.6
Same as 2.21.5
, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Fix return value from
tls_net_read
fluentbit:4098 - Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110 - Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
AWS for Fluent Bit 2.21.5
2.21.5
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.11
- Amazon CloudWatch Logs for Fluent Bit 1.6.4
- Amazon Kinesis Streams for Fluent Bit 1.8.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Same as 2.21.4
, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Fix return value from
tls_net_read
fluentbit:4098 - Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110 - Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
AWS for Fluent Bit 2.21.4
2.21.4
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.10
- Amazon CloudWatch Logs for Fluent Bit 1.6.4
- Amazon Kinesis Streams for Fluent Bit 1.8.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Compared to 2.21.3
this release adds:
- Bug - Fix handling of TCP connections on SIGTERM fluentbit:2610
- Bug - Auto retry invalid cloudwatch requests to resolve sequence token errors fluentbit:4189
Same as 2.21.3
, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Fix return value from
tls_net_read
fluentbit:4098 - Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110 - Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
AWS for Fluent Bit 2.21.3
2.21.3
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.9
- Amazon CloudWatch Logs for Fluent Bit 1.6.4
- Amazon Kinesis Streams for Fluent Bit 1.8.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Same as 2.21.2
, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Fix return value from
tls_net_read
fluentbit:4098 - Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110 - Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
Important Note:
- A security vulnerability was found in amazonlinux which we use as base image to our
aws-for-fluent-bit
image. This new image will be based on an updated version of amazonlinux that resolves this CVE.
AWS for Fluent Bit 2.21.2
2.21.2
This release includes:
- An Amazon Linux 2 Base
- Fluent Bit 1.8.9
- Amazon CloudWatch Logs for Fluent Bit 1.6.4
- Amazon Kinesis Streams for Fluent Bit 1.8.0
- Amazon Kinesis Firehose for Fluent Bit 1.6.1
Compared to 2.21.1
this release adds:
- Bug - Remove corrupted unicode fragments on truncation aws-for-fluent-bit:252
Compared to 2.21.1
this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259
Same as 2.21.1
, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:
- Bug - Fix return value from
tls_net_read
fluentbit:4098 - Bug - Downgrade
mbedtls
to 2.24.0 to fix the performance regression issue inmbedtls
2.26.0 fluentbit:4110