doc/administration/dedicated/monitor.md
{{< details >}}
{{< /details >}}
GitLab Dedicated automatically delivers your instance's application logs to a private Amazon S3 bucket. These logs contain both infrastructure and application data for monitoring, troubleshooting, and compliance purposes.
The S3 bucket contains logs that are:
YYYY/MM/DD/HH format.If you use your own encryption keys, application logs use GitLab-managed keys, not your provided key.
You can add, edit, or remove AWS IAM users and roles that have read-only access to your application logs.
Access your application logs to do the following:
Prerequisites:
[!note] You can only use IAM user and role ARNs. Security Token Service (STS) ARNs and wildcards are not supported.
To manage log access:
Sign in to Switchboard.
At the top of the page, select Configuration.
Expand Resource access.
Under Application logs, in the Log access ARNs section:
arn:aws:iam::123456789012:user/usernamearn:aws:iam::123456789012:role/rolenameCopy the Logs S3 bucket name. Your authorized users or roles use this bucket name to access the logs.
After you configure ARN permissions and provide the bucket name to your users, they can access all objects in the S3 bucket. To verify access, use the AWS CLI.
For information about how to access S3 buckets in AWS, see Accessing an Amazon S3 bucket.
You can enable S3 event notifications on your GitLab Dedicated logging bucket to integrate with your security monitoring systems. Notifications are sent when log files are created.
S3 event notifications can send notifications to:
The destination resources must be in the same region as your GitLab Dedicated instance.
To enable S3 event notifications:
In your support request, include:
After GitLab Support provides the required IAM policy, attach it to your SQS queue or SNS topic.
GitLab Support then completes the S3 event notifications configuration on your S3 logs bucket.