doc/administration/dedicated/monitor.md
{{< details >}}
{{< /details >}}
GitLab Dedicated automatically delivers your instance's application logs to a private Amazon S3 bucket. These logs contain both infrastructure and application data for monitoring, troubleshooting, and compliance purposes.
The S3 bucket contains logs that are:
YYYY/MM/DD/HH format.If you use your own encryption keys, application logs use GitLab-managed keys, not your provided key.
You can add, edit, or remove AWS IAM users and roles that have read-only access to your application logs.
Prerequisites:
[!note] You can only use IAM user and role ARNs. Security Token Service (STS) ARNs and wildcards are not supported.
To manage log access:
Sign in to Switchboard.
At the top of the page, select Configuration.
Expand Resource access.
Under Application logs, in the Log access ARNs section:
arn:aws:iam::123456789012:user/usernamearn:aws:iam::123456789012:role/rolenameCopy the Logs S3 bucket name. Your authorized users or roles use this bucket name to access the logs.
After you configure ARN permissions and provide the bucket name to your users, they can access all objects in the S3 bucket. To verify access, use the AWS CLI.
For information about how to access S3 buckets in AWS, see Accessing an Amazon S3 bucket.