Skip to content

Releases: aws/aws-for-fluent-bit

AWS for Fluent Bit 2.23.3

31 Mar 21:07
Compare
Choose a tag to compare

2.23.3

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.15
  • Amazon CloudWatch Logs for Fluent Bit 1.7.0
  • Amazon Kinesis Streams for Fluent Bit 1.9.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Same as 2.23.2, this release includes the following fix for AWS customers that we are working on getting accepted upstream:

New Tool:

  • firelens-datajet is a holistic log/metric routing software test tool made to flexibly send test data to Fluent Bit in a repeatable, reliable, and portable manner. Create test configuration JSONs that modularly connect test data generators to data senders, customize data generation rate, send data in parallel over various ingestion routes, and mock log router destinations.

We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit under different input load.

plugin 20 MB/s 25 MB/s 30 MB/s
kinesis_firehose Log Loss
Log Duplication 0%(1309) 0%(468)
kinesis_streams Log Loss
Log Duplication 0%(484) 0%(1341)
s3 Log Loss
Log Duplication
plugin 1 MB/s 2 MB/s 3 MB/s
cloudwatch_logs Log Loss 0%(1308) 0%(2678)
Log Duplication 3%(40280) 4%(51357)

Note:

  • The green check ✅ in the table means no log loss or no log duplication.
  • Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
  • CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
  • Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.

AWS for Fluent Bit 2.23.2

24 Mar 22:58
Compare
Choose a tag to compare

2.23.2

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.14
  • Amazon CloudWatch Logs for Fluent Bit 1.7.0
  • Amazon Kinesis Streams for Fluent Bit 1.9.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Compared to 2.23.1 this release adds:

  • Enhancement - Mitigate throttling issue on log group in cloudwatch_logs plugin fluentbit:4826

Same as 2.23.1, this release includes the following fix for AWS customers that we are working on getting accepted upstream:


We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit under different input load.

plugin 20 MB/s 25 MB/s 30 MB/s
kinesis_firehose Log Loss 0%(341)
Log Duplication 0%(500)
kinesis_streams Log Loss 0%(3824)
Log Duplication 0%(1819)
s3 Log Loss
Log Duplication
plugin 1 MB/s 2 MB/s 3 MB/s
cloudwatch_logs Log Loss 2%(17084) 0%(1671) 0%(2678)
Log Duplication 7%(77539) 6%(80560)

Note:

  • The green check ✅ in the table means no log loss or no log duplication.
  • Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
  • CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
  • Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.

AWS for Fluent Bit 2.23.1

18 Mar 06:23
Compare
Choose a tag to compare

2.23.1

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.13
  • Amazon CloudWatch Logs for Fluent Bit 1.7.0
  • Amazon Kinesis Streams for Fluent Bit 1.9.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Same as 2.23.0, this release includes the following fix for AWS customers that we are working on getting accepted upstream:

Important Note:

  • Two security vulnerability were found in amazonlinux which we use as base image to our aws-for-fluent-bit image- ALAS-2022-1764 and ALAS-2022-1766. This new image will be based on an updated version of amazonlinux that resolves these CVEs.

We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit under different input load.

plugin 20 MB/s 25 MB/s 30 MB/s
kinesis_firehose Log Loss 0%(16) 0%(1630)
Log Duplication 0%(256)
kinesis_streams Log Loss 0%(15)
Log Duplication 0%(1831) 0%(485)
s3 Log Loss
Log Duplication
plugin 1 MB/s 2 MB/s 3 MB/s
cloudwatch_logs Log Loss 0%(332) 0%(2307)
Log Duplication 6%(80560) 3%(51357)

Note:

  • The green check ✅ in the table means no log loss or no log duplication.
  • Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
  • CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
  • Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.

AWS for Fluent Bit 2.23.0

11 Mar 01:27
Compare
Choose a tag to compare

2.23.0

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.13
  • Amazon CloudWatch Logs for Fluent Bit 1.7.0
  • Amazon Kinesis Streams for Fluent Bit 1.9.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Compared to 2.22.0 this release adds:

  • Feature - Add timeout config for AWS SDK Go HTTP calls kinesis:178
  • Enhancement - Migrate AWS plugins to performant 2.25.0-mbedtls base64 implementation fluentbit:4422
  • Bug - Fix message loss issue using concurrency feature with 0 retries kinesis:179

Compared to 2.22.0 this release deletes the following fix which has been covered in new enhancement:

  • Bug - Downgrade mbedtls to 2.24.0 to fix the performance regression issue in mbedtls 2.26.0 fluentbit:4110

Same as 2.22.0, this release includes the following fix for AWS customers that we are working on getting accepted upstream:


We’ve run the new released image in our ECS load testing framework and here is the result. This testing result provides benchmarks of aws-for-fluent-bit under different input load.

plugin 20Mb/s 25Mb/s 30Mb/s
kinesis_firehose Log Loss
Log Duplication 0%(1064)
kinesis_streams Log Loss
Log Duplication
s3 Log Loss
Log Duplication
plugin 1Mb/s 2Mb/s 3Mb/s
cloudwatch_logs Log Loss 0%(332) 0%(2678)
Log Duplication 6%(71497) 2%(39273)

Note:

  • The green check ✅ in the table means no log loss or no log duplication.
  • Number in parentheses means the number of records out of total records. For example, 0%(1064) under 30Mb/s throughput means 1064 duplicate records out of 18M input records by which log duplication percentage is 0%.
  • CloudWatch has own throughput limit for single log stream. Based on our tests, it starts to appear throttling issue after input load > 1Mb/s.
  • Log loss is the percentage of data lost and log duplication is the percentage of duplicate logs received at the destination. Your results may differ because they can be influenced by many factors like different configs and environment settings. Log duplication is exclusively caused by partially succeeded batches that were retried, which means it is random.

AWS for Fluent Bit 2.22.0

03 Feb 00:09
Compare
Choose a tag to compare

2.22.0

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.12
  • Amazon CloudWatch Logs for Fluent Bit 1.7.0
  • Amazon Kinesis Streams for Fluent Bit 1.8.1
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Compared to 2.21.6 this release adds:

Same as 2.21.6, this release includes the following fix for AWS customers that has been accepted by upstream:

Same as 2.21.6, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

  • Bug - Downgrade mbedtls to 2.24.0 to fix the performance regression issue in mbedtls 2.26.0 fluentbit:4110
  • Bug - Resolve IMDSv1 fallback error introduced in 2.21.0 aws-for-fluent-bit:259

AWS for Fluent Bit 2.21.6

12 Jan 06:50
Compare
Choose a tag to compare

2.21.6

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.11
  • Amazon CloudWatch Logs for Fluent Bit 1.6.4
  • Amazon Kinesis Streams for Fluent Bit 1.8.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Compared to 2.21.5 this release adds:

  • Go version upgrade to 1.17.6

Same as 2.21.5, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

AWS for Fluent Bit 2.21.5

19 Dec 23:05
Compare
Choose a tag to compare

2.21.5

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.11
  • Amazon CloudWatch Logs for Fluent Bit 1.6.4
  • Amazon Kinesis Streams for Fluent Bit 1.8.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Same as 2.21.4, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

AWS for Fluent Bit 2.21.4

09 Dec 00:03
Compare
Choose a tag to compare

2.21.4

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.10
  • Amazon CloudWatch Logs for Fluent Bit 1.6.4
  • Amazon Kinesis Streams for Fluent Bit 1.8.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Compared to 2.21.3 this release adds:

  • Bug - Fix handling of TCP connections on SIGTERM fluentbit:2610
  • Bug - Auto retry invalid cloudwatch requests to resolve sequence token errors fluentbit:4189

Same as 2.21.3, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

AWS for Fluent Bit 2.21.3

03 Dec 19:33
Compare
Choose a tag to compare

2.21.3

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.9
  • Amazon CloudWatch Logs for Fluent Bit 1.6.4
  • Amazon Kinesis Streams for Fluent Bit 1.8.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Same as 2.21.2, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

Important Note:

  • A security vulnerability was found in amazonlinux which we use as base image to our aws-for-fluent-bit image. This new image will be based on an updated version of amazonlinux that resolves this CVE.

AWS for Fluent Bit 2.21.2

16 Nov 01:11
Compare
Choose a tag to compare

2.21.2

This release includes:

  • An Amazon Linux 2 Base
  • Fluent Bit 1.8.9
  • Amazon CloudWatch Logs for Fluent Bit 1.6.4
  • Amazon Kinesis Streams for Fluent Bit 1.8.0
  • Amazon Kinesis Firehose for Fluent Bit 1.6.1

Compared to 2.21.1 this release adds:

Compared to 2.21.1 this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

Same as 2.21.1, this release includes the following fixes for AWS customers that we are working on getting accepted upstream:

  • Bug - Fix return value from tls_net_read fluentbit:4098
  • Bug - Downgrade mbedtls to 2.24.0 to fix the performance regression issue in mbedtls 2.26.0 fluentbit:4110