Top
Enterprise Postgres 18 for Kubernetes User's Guide

E.4.4 Create a secret using base64 encoded content

Sample aws-credentials secret YAML template

kind: Secret
apiVersion: v1
metadata:
  name: aws-credentials
  namespace: <namespace>
data:
  config: <base64_encoded_content>
  credentials: <base64_encoded_content>
type: Opaque

Create a Fluent Bit custom secret using the cloudwatch_logs Output plugin for Fluent Bit integration. For more information, refer to the Fluent Bit Manual.

In your main configuration file fluent-bit.yaml append the following Output section:

OUTPUT:
  Name: cloudwatch_logs  # Specifies the output plugin name
  Match: '*'             # Matches all log streams
  region: us-east-1      # The AWS region for CloudWatch Logs
  log_group_name: fluent-bit-cloudwatch  # Name of the CloudWatch log group
  log_stream_prefix: from-fluent-bit-     # Prefix for log stream names
  auto_create_group: On  # Automatically create the log group if it doesn't exist
  profile: <cloudwatch_logs_profile_default>  # The AWS profile to use for authentication
  auto_retry_requests: false  # Disables automatic retry for failed requests
  log_format: json    # Format of the logs to be sent