Integrate Amazon CloudWatch with Tiger Cloud
Export telemetry data to monitor and analyze your service performance and health
Amazon CloudWatch is a monitoring and observability service designed to help collect, analyze, and act on data from applications, infrastructure, and services running in AWS and on-premises environments.
You can export telemetry data from your Tiger Cloud services with the time-series and analytics capability enabled to CloudWatch. See Exported metrics for the full list of default and additional metrics you can export.
This pages explains how to export telemetry data from your Tiger Cloud service into CloudWatch by creating a Tiger Cloud data exporter, then attaching it to the service. This integration is available for Scale and Enterprise pricing tiers.
Prerequisites
Section titled “Prerequisites”To follow the steps on this page:
-
Create a target Tiger Cloud service with the Real-time analytics capability.
You need your connection details.
- Sign up for Amazon CloudWatch.
This feature is currently not supported for Tiger Cloud on Microsoft Azure.
Create a data exporter
Section titled “Create a data exporter”A Tiger Cloud data exporter sends telemetry data from a Tiger Cloud service to a third-party monitoring tool. You create an exporter on the project level, in the same AWS region as your service:
- In Tiger Console, open Exporters
- Click
New exporter - Select the data type and specify
AWS CloudWatchfor provider
- Provide your AWS CloudWatch configuration
- The AWS region must be the same for your Tiger Cloud exporter and AWS CloudWatch Log group.
- The exporter name appears in Tiger Console, best practice is to make this name easily understandable.
- For CloudWatch credentials, either use an existing CloudWatch Log group or create a new one. If you’re uncertain, use the default values. For more information, see Working with log groups and log streams.
- Choose the authentication method to use for the exporter

- In AWS, navigate to IAM > Identity providers, then click
Add provider. - Update the new identity provider with your details:
Set
Provider URLto the region where you are creating your exporter.
- Click
Add provider. - In AWS, navigate to IAM > Roles, then click
Create role. - Add your identity provider as a Web identity role and click
Next.
- Set the following permission and trust policies:
-
Permission policy:
{"Version": "2012-10-17","Statement": [{"Effect": "Allow","Action": ["logs:PutLogEvents","logs:CreateLogGroup","logs:CreateLogStream","logs:DescribeLogStreams","logs:DescribeLogGroups","logs:PutRetentionPolicy","xray:PutTraceSegments","xray:PutTelemetryRecords","xray:GetSamplingRules","xray:GetSamplingTargets","xray:GetSamplingStatisticSummaries","ssm:GetParameters"],"Resource": "*"}]} -
Role with a Trust Policy:
{"Version": "2012-10-17","Statement": [{"Effect": "Allow","Principal": {"Federated": "arn:aws:iam::12345678910:oidc-provider/irsa-oidc-discovery-prod.s3.us-east-1.amazonaws.com"},"Action": "sts:AssumeRoleWithWebIdentity","Condition": {"StringEquals": {"irsa-oidc-discovery-prod.s3.us-east-1.amazonaws.com:aud": "sts.amazonaws.com"}}},{"Sid": "Statement1","Effect": "Allow","Principal": {"AWS": "arn:aws:iam::12345678910:role/my-exporter-role"},"Action": "sts:AssumeRole"}]}
- Click
Add role.
-
When you use CloudWatch credentials, you link an Identity and Access Management (IAM) user with access to CloudWatch only with your Tiger Cloud service:
- Retrieve the user information from IAM > Users in AWS console.
If you do not have an AWS user with access restricted to CloudWatch only, create one. For more information, see Creating IAM users (console).
- Enter the credentials for the AWS IAM user.
AWS keys give access to your AWS services. To keep your AWS account secure, restrict users to the minimum required permissions. Always store your keys in a safe location. To avoid this issue, use the IAM role authentication method.
- Select the AWS Region your CloudWatch services run in
- Optionally tick
PostgreSQL metricsto export additional metrics, then clickCreate exporterSee Exported metrics for the full list.
Manage a data exporter
Section titled “Manage a data exporter”This section shows you how to attach, edit, and delete a data exporter.
Attach a data exporter to a Tiger Cloud service
To send telemetry data to an external monitoring tool, you attach a data exporter to your Tiger Cloud service. You can attach only one exporter to a service.
To attach an exporter:
- In Tiger Console, choose the service
- Click
Operations>Exporters - Select the exporter, then click
Attach exporter - If you are attaching a first
Logsdata type exporter, restart the service
You can now monitor your service metrics.
Edit a data exporter
To update a data exporter:
- In Tiger Console, open Exporters
- Next to the exporter you want to edit, click the menu >
Edit - Edit the exporter fields and save your changes
Delete a data exporter
To remove a data exporter that you no longer need:
- Disconnect the data exporter from your Tiger Cloud service
- In Tiger Console, choose the service.
- Click
Operations>Exporters. - Click the trash can icon next to the exporter.
- Repeat for every service attached to the exporter you want to remove.
The data exporter is now unattached from all services. However, it still exists in your project.
- Delete the exporter on the project level
- In Tiger Console, open Exporters
- Next to the exporter you want to edit, click menu >
Delete - Confirm that you want to delete the data exporter.
Reference
Section titled “Reference”When you create the IAM OIDC provider, the URL must match the region you create the exporter in. It must be one of the following:
| Region | Zone | Location | URL |
|---|---|---|---|
ap-southeast-1 | Asia Pacific | Singapore | irsa-oidc-discovery-prod-ap-southeast-1.s3.ap-southeast-1.amazonaws.com |
ap-southeast-2 | Asia Pacific | Sydney | irsa-oidc-discovery-prod-ap-southeast-2.s3.ap-southeast-2.amazonaws.com |
ap-northeast-1 | Asia Pacific | Tokyo | irsa-oidc-discovery-prod-ap-northeast-1.s3.ap-northeast-1.amazonaws.com |
ca-central-1 | Canada | Central | irsa-oidc-discovery-prod-ca-central-1.s3.ca-central-1.amazonaws.com |
eu-central-1 | Europe | Frankfurt | irsa-oidc-discovery-prod-eu-central-1.s3.eu-central-1.amazonaws.com |
eu-west-1 | Europe | Ireland | irsa-oidc-discovery-prod-eu-west-1.s3.eu-west-1.amazonaws.com |
eu-west-2 | Europe | London | irsa-oidc-discovery-prod-eu-west-2.s3.eu-west-2.amazonaws.com |
sa-east-1 | South America | São Paulo | irsa-oidc-discovery-prod-sa-east-1.s3.sa-east-1.amazonaws.com |
us-east-1 | United States | North Virginia | irsa-oidc-discovery-prod.s3.us-east-1.amazonaws.com |
us-east-2 | United States | Ohio | irsa-oidc-discovery-prod-us-east-2.s3.us-east-2.amazonaws.com |
us-west-2 | United States | Oregon | irsa-oidc-discovery-prod-us-west-2.s3.us-west-2.amazonaws.com |