← Back to Services

CloudWatch

Priority Tier 4 Domain 2: Design Resilient Architectures

Amazon CloudWatch is a monitoring and observability platform designed to give insight into AWS architecture, identify potential issues, and collect system-level and application-level metrics. It extends monitoring capabilities beyond default metrics through the CloudWatch Agent, enabling the collection of custom metrics and logs from various IT infrastructure components. CloudWatch can create alarms to notify users when something goes wrong and uses logs to create dashboards and metrics. (source_page: 2, 1)

Learning Objectives

Overview of Amazon CloudWatch

Amazon CloudWatch serves as the central monitoring and observability service within AWS, designed to provide comprehensive insights into the health and performance of AWS resources and applications.

Amazon CloudWatch is a monitoring and management service for AWS resources and the applications you run on AWS. Its primary function is to track the performance and health of your resources, allowing you to react to potential problems before they impact your users. You can collect and monitor log files from various sources, including Amazon EC2 instances, AWS CloudTrail, Amazon Route 53, and many others. CloudWatch is a distributed statistics-gathering system that collects and tracks metrics from your applications. You can also create and use your own custom metrics and receive notifications when an alarm is triggered.
CloudWatch is a monitoring and observability platform designed to give insight into AWS architecture and identify potential issues before they become bigger problems. Monitoring is necessary to catch warning signs before catastrophe strikes. It can collect system-level and application-level metrics to identify problems with the service, operating system, or resources.
While Amazon CloudWatch inherently offers robust capabilities for monitoring, including logs, metrics, and dashboarding, it doesn’t capture all relevant data points by default. The CloudWatch Agent is crucial for addressing these gaps, enabling the collection of metrics like memory and disk space utilization, as well as monitoring custom log file locations and creating custom metrics with unique namespaces.
CloudWatch comprises three main components: Metrics, Alarms, and Events.
CloudWatch offers two monitoring options for Amazon EC2 instances:
Provides seven pre-selected metrics at a 5-minute frequency and three status check metrics at a 1-minute frequency, at no extra charge.
Provides all metrics available in Basic Monitoring at a 1-minute frequency, for an additional charge. Offers data aggregation by Amazon EC2, Amazon Machine Image (AMI) ID, and instance type.
CloudWatch can help detect suspicious activity such as unusual spikes in service usage (CPU, disk, Amazon RDS) or anomalous billing metrics (requires enabling this feature in account settings). This can be crucial for detecting unauthorized access or compromised credentials.
CloudWatch is an example of a tool used for monitoring within the Operational Excellence pillar, which focuses on running and monitoring systems efficiently.
CloudWatch is used to enable traceability by logging all activities in the application landscape, helping to track resource creation/deletion and API access, supporting the Security pillar which focuses on protecting data and systems.

CloudWatch Metrics

Metrics are fundamental to CloudWatch, representing time-ordered sets of data points that quantify the performance and health of your resources and applications.

Metrics are time-ordered sets of data points representing the values of a monitored variable over time. Examples include CPU utilization, network traffic, and disk I/O.
A container for related metrics. AWS namespaces follow the convention AWS/<service> (e.g., AWS/EC2). User-defined metrics can be grouped by user-defined namespaces.
Technical Specs: AWS namespaces convention: AWS/<service>
Name-value pairs that further categorize metrics (e.g., InstanceId for CPU utilization). Adding dimensions allows for more granular monitoring and analysis.
The time interval over which metrics are collected (in seconds). Shorter periods provide more frequent updates but increase data volume.
There are two kinds of metrics in CloudWatch: default metrics that come with every service and custom metrics that require the CloudWatch agent to be installed in the operating system.
Custom metrics are user-defined metrics, grouped by user-defined namespaces, published using the AWS CLI, an API, or a CloudWatch agent.
Standard metrics have a reporting interval of 5 minutes.
Technical Specs: Reporting interval: 5 minutes
Detailed metrics have a reporting interval of 1 minute and an additional cost.
Technical Specs: Reporting interval: 1 minute; Additional cost: Yes

CloudWatch Alarms

CloudWatch Alarms enable you to monitor metrics and automatically trigger actions when predefined thresholds are breached, ensuring proactive response to operational issues.

CloudWatch alarms have three states:
The metric is within the defined threshold.
The metric is outside the defined threshold. Important: An ALARM state doesn’t automatically signify an emergency; it simply indicates that the metric has exceeded (or fallen below) the threshold.
The alarm is new, the metric is unavailable, or there isn’t enough data to determine the state.
You can create CloudWatch alarms that monitor single metrics or mathematical expressions based on multiple metrics. Alarms trigger actions when a metric crosses a defined threshold for a specified duration. The action can be anything from sending an email to automatically scaling resources.
When the threshold is breached, you can choose to receive a notification by email or SMS, or you can choose to take an automated action such as stopping an EC2 instance or triggering an auto-scaling group.
Composite alarms can be used to combine alarms (e.g. summarized, aggregated health indicator).
Monitors estimated AWS charges and generates alerts when charges exceed a specified threshold. Billing metric data is stored in the US East (Northern Virginia) Region, representing worldwide charges. Sends alarm notifications via email through an Amazon SNS topic.

CloudWatch Events

Amazon CloudWatch Events is a serverless event bus that provides a near real-time stream of system events, enabling automated responses to changes in your AWS resources.

CloudWatch Events provides a continuous stream of system events reflecting changes in AWS resources. You can configure simple rules to match events and direct them to various target functions or streams (e.g., AWS Lambda, Amazon SNS, Amazon SQS). It enables automated actions, creating custom rules and targets for event actions, and integration with other AWS services. This results in automation of tasks, improved operational efficiency, reduced manual intervention, and enhanced security and compliance.
Events indicate changes in the AWS environment (e.g., an EC2 instance changing state). Custom application-level events can also be published.
Targets process events; examples include EC2 instances, AWS Lambda functions, Amazon SNS topics, and Amazon SQS queues.
Rules match incoming events and route them to targets for processing. A single rule can have multiple parallel targets.
CloudWatch Events can be used to schedule automated actions that self trigger at specific times using cron or rate expressions. For example, each time Amazon EC2 Auto Scaling launches an EC2 instance, a specified AWS Systems Manager Run Command script can be automatically executed using a CloudWatch Events rule. Another example is creating a real-time notification that informs you when an instance is stopped or terminated.

CloudWatch Agent

The CloudWatch Agent is a software package designed to automatically collect system-level and application-specific metrics and logs from your IT infrastructure, extending Amazon CloudWatch's monitoring capabilities beyond default metrics.

The CloudWatch Agent is a software daemon that runs continuously on your servers, proactively collecting specified metrics and logs and sending them to Amazon CloudWatch for analysis and visualization.

Purpose and Role

The CloudWatch Agent is a software package designed to automatically collect system-level and application-specific metrics and logs from your IT infrastructure. Its primary purpose is to enhance the monitoring capabilities of Amazon CloudWatch, extending its reach beyond the default metrics provided.

Definition

The CloudWatch Agent is a software daemon that runs continuously on your servers, proactively collecting specified metrics and logs and sending them to Amazon CloudWatch for analysis and visualization.

Supported Installation Environments

The agent can be installed on a variety of platforms.
amazon_ec2_instances: Supporting Linux, Windows, and macOS
hybrid_environments: Including virtual machines on Azure, Google Cloud Platform (GCP)
on_premise_workloads: Servers running in your own data centers

Key Use Cases - Monitoring Resource Utilization (Memory, Disk)

CloudWatch does not track RAM usage or available disk space by default. The agent collects these vital metrics, providing essential visibility into resource constraints.

Key Use Cases - Custom Log File Monitoring

For applications that write logs to specific files (e.g., web server access and error logs), the agent can be configured to stream these logs to CloudWatch Logs for analysis, alerting, and archival.

Key Use Cases - Custom Metrics and Namespaces

Beyond standard system metrics, the agent allows you to define and send custom metrics with unique namespaces, categorizing your application-specific performance data.

Key Use Cases - Advanced System and Application Metrics

It enables the collection of detailed operating system-level metrics or application-specific performance data that are not exposed through default CloudWatch mechanisms.

Key Use Cases - Containerized Environments

The agent is also valuable for collecting logs and metrics from containerized applications and microservices, providing insights into their operational health.

Prerequisites - Software Installation

The CloudWatch Agent software must be installed on the target machine.

Prerequisites - Permissions and Authentication (EC2 Instances)

The recommended approach is to assign an Instance Role to the EC2 instance. This role should have policies attached that grant the necessary permissions for the agent to communicate with CloudWatch services (e.g., CloudWatchAgentAdminPolicy).

Prerequisites - Permissions and Authentication (On-Premise/Other Cloud Providers)

For workloads not running on EC2, you will need to create IAM Access Key and Secret Access Key credentials and configure the agent to use them.

Prerequisites - Network Configuration (Security Groups)

Outbound network access is necessary for the agent to communicate with CloudWatch. For EC2 Instances, ensure that the instance’s Security Group has outbound rules configured to allow traffic to the necessary CloudWatch endpoints. While default security groups usually permit all outbound traffic, custom security groups require explicit configuration.

CloudWatch Agent Installation and Configuration on Linux EC2

procedure

This section outlines the steps for installing and configuring the CloudWatch Agent on a Linux EC2 instance to collect custom metrics and logs.

A detailed demonstration of the end-to-end process for installing, configuring, and verifying the CloudWatch Agent on a Linux EC2 instance.

Prerequisites

  • Linux-based EC2 instance ready in AWS Management Console
  • IAM Role with CloudWatchAgentAdminPolicy and AmazonSSMFullAccess policies
  • Security Group allowing outbound traffic to CloudWatch endpoints
1

Initial CloudWatch Metrics Review (Default)

💡 To observe default metrics (CPU utilization, disk I/O, network traffic) and note the absence of memory usage and disk space availability.

2

Create and Assign IAM Role

💡 The agent requires appropriate permissions to send data to CloudWatch. For EC2 instances, assigning an Instance Role is the recommended approach.

3

Create Role in IAM dashboard: Select 'AWS service' as trusted entity and 'EC2' as service.

4

Attach Policies: Attach 'CloudWatchAgentAdminPolicy' and 'AmazonSSMFullAccess'.

5

Name Role: Provide a descriptive name (e.g., ec2-instance-profile-for-demo).

6

Assign Role to EC2 instance: Go to EC2 instance, select 'Actions' > 'Security' > 'Modify IAM role,' and assign the newly created role.

7

Security Group Configuration

💡 Outbound network access is necessary for the agent to communicate with CloudWatch.

8

Create a new security group (e.g., demo-SecurityGroup).

9

Outbound Rules: Ensure the default outbound rule allowing all traffic is sufficient. Restricting this rule will disrupt agent communication.

10

Assign Security Group: Associate this security group with your EC2 instance.

11

System Preparation (HTTPD Server - Optional for log monitoring demo)

💡 To demonstrate custom log monitoring.

12

Install HTTPD: sudo yum install httpd -y

13

Create a sample index.html file.

14

Start and enable the service: sudo systemctl start httpd && sudo systemctl enable httpd.

15

Agent and CollectD Installation

16

Install the CloudWatch Agent: sudo yum install amazon-cloudwatch-agent -y

17

Install CollectD (for system stats): sudo amazon-linux-extras install collectd -y

18

Configuration Wizard Walkthrough

💡 The wizard generates a JSON configuration file and saves it to the Systems Manager Parameter Store.

19

Run the agent’s configuration wizard: /opt/aws/amazon-cloudwatch-agent/bin/amazon-cloudwatch-agent-config-wizard.sh

20

Follow prompts to configure: OS, installation target (EC2), enable StatsD (optional), monitor metrics from CollectD, monitor host metrics (CPU, Memory), add EC2 dimensions (Instance ID, Type, Image ID), select metric collection resolution (basic or high resolution).

21

Configure log file monitoring (e.g., /var/log/httpd/access_log, /var/log/httpd/error_log) with custom log group and stream names.

22

Running the Agent with Configuration

💡 The agent will start, fetching the configuration from the specified SSM Parameter Store path.

23

Execute the agent: /opt/aws/amazon-cloudwatch-agent/bin/amazon-cloudwatch-agent-ctl -a fetch-config -m ec2 -c ssm:AmazonCloudWatch-linux -region <your-region>

CloudWatch Agent Installation and Configuration on Windows EC2

procedure

This section details the step-by-step installation and configuration of the Amazon CloudWatch agent on a Windows EC2 instance.

The process to install and configure the CloudWatch agent on a Windows EC2 instance, utilizing AWS Systems Manager for efficient deployment and management.

Prerequisites

  • Active AWS account
  • At least one Windows EC2 instance in a running state
  • CloudWatch Unified Agent software must be installed on the target instance
  • IAM instance role with AmazonCloudWatchAgentAdminPolicy, AmazonCloudWatchAgentServerPolicy, AmazonSSMFullAccess, and AmazonSSMManagedInstanceCore policies
  • Security group of the EC2 instance must allow outbound connections to AWS CloudWatch services
1

Creating an IAM Role for EC2 Instance

💡 The CloudWatch Agent requires appropriate permissions to communicate with AWS CloudWatch services.

2

Navigate: AWS Management Console -> IAM -> Roles -> Create role.

3

Service Selection: Choose 'EC2' as the service.

4

Permissions Policies: Attach 'AmazonCloudWatchAgentAdminPolicy', 'AmazonCloudWatchAgentServerPolicy', 'AmazonSSMFullAccess', and 'AmazonSSMManagedInstanceCore'.

5

Role Naming: Provide a descriptive name (e.g., CES Cloud Expert Solution IAM).

6

Assignment: Attach the newly created IAM role to the running Windows EC2 instance via the EC2 console (Security tab -> Modify IAM role).

7

Installing CloudWatch Agent using AWS Systems Manager (SSM)

💡 SSM Run Command provides a scalable solution for deploying and managing agents across multiple instances.

8

Verify Instance Readiness: Ensure the EC2 instance appears as a managed instance in the Systems Manager console (Fleet Manager). This can take 30 seconds to over a minute.

9

Navigate: Systems Manager -> Run Command.

10

Command Document: Select 'AWS-ConfigureAWSPackage'.

11

Action: Select 'Install'.

12

Installation Type: Select 'Uninstall and reinstall' (to ensure a clean install).

13

Package Name: Enter 'AmazonCloudWatchAgent'.

14

Version: Enter 'latest'.

15

Target Selection: Choose 'Manual' and select the single Windows EC2 instance.

16

Execute: Click 'Run'. The status will change to 'Success' upon successful installation.

17

Configuring the CloudWatch Agent

💡 The configuration wizard helps set up metrics and log collection, and stores the configuration in SSM Parameter Store.

18

Access: Remote Desktop Protocol (RDP) into the Windows EC2 instance.

19

Verification of Installation: Navigate to C:\Program Files\Amazon\Amazon CloudWatch Agent\ to confirm the agent’s presence.

20

Launch Configuration Wizard: Open Command Prompt as Administrator, navigate to cd "C:\Program Files\Amazon\Amazon CloudWatch Agent\", and run AmazonCloudWatchAgentConfigWizard.exe.

21

Follow wizard prompts: Select Windows OS, use EC2 instance metadata for region, identify as EC2 instance, enable StatsD (yes), accept default port, collection interval 10 seconds, aggregation interval 60 seconds. Do not import existing configuration.

22

Configure Host Metrics: Select 'yes' to monitor CPU, Memory, 'yes' for CPU per core, 'yes' for EC2 dimensions, 'yes' to aggregate EC2 dimensions. Accept default 60 seconds for High Resolution Metrics.

23

Configure Custom Log File Monitoring: Select 'yes' if needed, provide path (e.g., var/log/app.log), choose default log stream name (Instance ID), specify log retention (e.g., 5 days). Select 'no' for additional log files. Select 'no' for Windows Event Log Monitoring and X-Ray Traces if not needed.

24

Store Config in SSM Parameter Store: Select 'yes'. Use default parameter store name 'AmazonCloudWatchWindows' or provide custom. Confirm region and use default credentials. A success message will appear: 'Successfully put config to parameter store. Press enter to exit.'

25

Starting CloudWatch Agent Service

💡 To activate the agent and begin collecting metrics and logs.

26

Navigate: Systems Manager -> Run Command.

27

Command Document: Select 'AmazonCloudWatch-ManageAgent'.

28

Action: Select 'Configure'.

29

Mode: Select 'EC2'.

30

Optional Configuration Location: Enter the parameter store name (e.g., 'AmazonCloudWatchWindows').

31

Optional Restart: Select 'Yes'.

32

Target Selection: Manual selection of the EC2 instance. Click 'Run'.

CloudWatch Logs

CloudWatch Logs is a fundamental AWS service for centralized log management, enabling monitoring, storage, and access to log files from various sources across your AWS environment.

CloudWatch Logs is a tool provided by AWS to help monitor, store, and access log files from various sources. It centralizes the logs from all of your systems, applications, and AWS services that you use, in a single, highly scalable service. It enables efficient monitoring, storage, and access of log files from various sources.
Logging events are individual data points that contain the data and a timestamp of when that data occurred.
Log streams are collections of logging events from a single source, such as a single EC2 instance serving a website.
Logging groups group together multiple log streams from different sources, such as all the web server logs from multiple EC2 instances. Each log group represents a specific log type with a defined format.
The typical log analysis process comprises three phases: Configure, Collect, and Analyze.
Determine the information to save, file format, delimiters, and fields for each service.
Upload log files from various cloud resources (e.g., Amazon S3, Amazon EMR) to a central location. CloudWatch Logs uses the CloudWatch agent for automatic log collection from supported services (e.g., EC2 instances).
Use analytics tools (like CloudWatch Logs Insights) to examine data, identify errors, investigate issues, monitor releases, and track trends.
Metric filters enable searching for specific string patterns within log groups. Each match increments a custom CloudWatch metric, which can trigger alarms or notifications. Filter Patterns define filter patterns using a specific syntax. Patterns are case-sensitive. Multiple terms are allowed, but all must be present in the log event for a match.
CloudWatch Logs Insights provides a query language for querying logs and creating visualizations. It allows users to query all logs using SQL-like commands to look for general trends.
You can configure a CloudWatch Logs log group to stream data it receives to your Amazon OpenSearch Service cluster in near real-time through a CloudWatch Logs subscription.
CloudWatch Logs can be used with various log-creating services, including EC2, Lambda, RDS, CloudTrail, and on-premises resources.
CloudWatch Logs is agent-based, meaning that it requires an agent to be installed on the host in order to stream logs to CloudWatch Logs. The CloudWatch agent can be used for both streaming logs and shipping custom metrics. Once the agent is installed, a configuration file can be generated using the config wizard. The configuration file is a JSON document that specifies the logs to be monitored and their location. After the configuration file is generated, the agent can be loaded with the configuration file and started to begin streaming logs to CloudWatch Logs.

Creating a CloudWatch Logs Metric Filter and Alarm

procedure

This procedure outlines how to create a metric filter in CloudWatch Logs to identify specific patterns (e.g., 404 errors) and then set up an alarm based on that metric.

Configure a filter to identify 404 Errors in a log file and then set up an alarm to send a notification when too many 404 Not Found errors are received.

Prerequisites

  • EC2 instance with web server generating access logs (e.g., Apache HTTPD)
  • CloudWatch Agent configured to stream web server access logs to a CloudWatch Log Group (e.g., HttpAccessLog)
  • An email address to receive SNS notifications
1

Generate Log Data

💡 To populate the log group with data that includes the pattern you intend to filter (e.g., 404 errors).

2

Access the web server's public IP in a browser to generate access logs.

3

Attempt to access non-existent pages (e.g., append /start to the URL) multiple times to generate 404 errors in the access logs.

4

Navigate to CloudWatch Log Groups

5

From the Services menu, choose CloudWatch.

6

In the left navigation pane, choose Log groups. Verify 'HttpAccessLog' is listed.

7

Create a Metric Filter

💡 To identify specific log patterns (e.g., 404 errors) from the log data.

8

Select the check box next to 'HttpAccessLog'.

9

From the Actions dropdown menu, select 'Create metric filter'.

10

Paste the Filter pattern: '[ip, id, user, timestamp, request, status_code=404, size]'

💡 This pattern tells CloudWatch Logs how to interpret fields and filters for lines with 'status_code=404'.

[ip, id, user, timestamp, request, status_code=404, size]
11

In the Test pattern section, select the EC2 instance ID from the dropdown.

12

Click 'Test pattern' and then 'Show test results' to verify that at least one result with a $status_code of 404 is found.

13

Click 'Next'.

14

In the Create filter name section, enter '404Errors' as the Filter name.

15

In the Metric details section, configure: Metric namespace: 'LogMetrics', Metric name: '404Errors', Metric value: '1'.

16

Click 'Next' and then 'Create metric filter'.

17

Create an Alarm using the Filter

💡 To send a notification when the number of 404 errors exceeds a predefined threshold.

18

In the '404Errors' panel (metric filter), choose the check box in the top-right corner.

19

In the Metric filters section, choose 'Create alarm'.

20

Configure settings: Period: '1 minute'. Condition: 'Whenever 404Errors is: Greater/Equal than: 5'.

21

Click 'Next'.

22

In the Notification section, select 'Create new topic'. Enter an email address that you can access. Click 'Create topic'.

23

Click 'Next'.

24

For Name and description, configure: Alarm name: '404 Errors', Alarm description: 'Alert when too many 404s detected on an instance'.

25

Click 'Next' and then 'Create alarm'.

26

Go to your email, look for a confirmation message, and select the 'Confirm subscription' link.

CloudWatch Integrations & Advanced Use Cases

CloudWatch extends its capabilities through seamless integration with numerous AWS services, enabling comprehensive monitoring, automation, and deeper insights across the AWS ecosystem.

AWS VPC Flow Logs captures information about the IP traffic going to and from network interfaces in your VPC. This data can be published to Amazon CloudWatch for monitoring, creating custom metrics, and alerts for potential security issues. CloudWatch Logs Insights can be used to query this data for trend analysis.
CloudWatch plays a critical role in Auto Scaling by monitoring EC2 instance metrics (CPU, memory, network, etc.). If a metric crosses a predefined threshold, CloudWatch triggers an alarm, which notifies the relevant Auto Scaling policy. This policy then instructs the Auto Scaling group to perform a scaling action (e.g., add or remove an instance).
Amazon RDS integrates seamlessly with CloudWatch, providing key performance metrics like CPU utilization, Disk Queue Depth, IO Latency, and IO Throughput. Performance Insights, a database performance monitoring feature, is also integrated with CloudWatch. Additionally, database logs can be exported to CloudWatch Logs for analysis.
AWS CloudTrail records API calls and actions, and securely delivers these logs to an S3 bucket. These logs can also be sent to Amazon CloudWatch Logs for real-time alerts on specific activities (e.g., critical security group modifications, IAM permission elevation attempts).
Amazon Managed Grafana is a fully managed AWS service for secure data visualization, querying, correlating, and visualizing operational metrics, logs, and traces from a variety of data sources. CloudWatch is one of the built-in data sources for Amazon Managed Grafana.
For on-premise or other cloud VMs managed by AWS Systems Manager (SSM), the non-admin IAM user and group for Systems Manager require 'CloudWatch read-only access' policy attached for monitoring purposes. This allows SSM to collect and display inventory data from managed instances, with monitoring insights available in CloudWatch.

Exam Tips

Glossary

CloudWatch Agent
A software package/daemon designed to automatically collect system-level and application-specific metrics and logs from IT infrastructure and send them to Amazon CloudWatch for analysis and visualization.
Logging Event
Individual data points that contain data and a timestamp of when that data occurred.
Log Stream
Collections of logging events from a single source, such as a single EC2 instance serving a website.
Log Group
Groups together multiple log streams from different sources, representing a specific log type with a defined format.
Metric Filter
A feature in CloudWatch Logs that enables searching for specific string patterns within log groups, incrementing a custom CloudWatch metric for each match.
CloudWatch Logs Insights
A feature that provides a query language for querying logs using SQL-like commands to look for general trends and create visualizations.
Namespace
A container for related metrics in CloudWatch, following the convention AWS/<service> for AWS services or user-defined for custom metrics.
Dimensions
Name-value pairs that further categorize metrics (e.g., InstanceId for CPU utilization), allowing for more granular monitoring and analysis.
Period
The time interval over which metrics are collected (in seconds).
Metric Collection Resolution (Basic)
Standard metric collection at a 5-minute frequency.
Metric Collection Resolution (High Resolution)
Detailed metric collection at a 1-minute frequency, incurring additional cost.
Composite Alarms
Alarms that combine the states of multiple other alarms into a single, aggregated health indicator.
Warmup period
A configurable window where new instances are not counted against health checks or scaling metrics, allowing them to stabilize.
Cooldown period
A configurable window where scaling events are ignored after a previous scaling activity, preventing rapid or runaway scaling actions. Default is 300 seconds (5 minutes).
Steady state auto scaling group
An Auto Scaling group configured with a minimum, maximum, and desired capacity of 1, often used for legacy resources where only one instance should be online at a time for high availability.

Key Takeaways

Content Sources

CloudWatch Agent Installation and Con... Monitoring Amazon CloudWatch Agent Installation ... CloudWatch Agent Installation on Wind... Jumpstart on AWS Extracted: 2026-01-26 09:03:06.760354 Model: gemini-2.5-flash