Sending logs to CloudWatch Logs using HLC endpoint
Amazon CloudWatch Logs supports an HTTP Log Collector (HLC) endpoint that allows you to send logs directly to CloudWatch Logs using a simple HTTP-based protocol. This feature simplifies log ingestion for applications and services without requiring AWS SDK integration.
The HLC endpoint feature enables you to:
Send logs to CloudWatch Logs using HTTP-based protocol
Authenticate using IAM service-specific credentials (bearer tokens)
Ingest logs without requiring AWS SDK integration
Use simple HTTP POST requests from any application or service
Note
API key (bearer token) for HLC endpoint access is currently in preview and available in the following AWS Regions: us-east-1, us-west-1, us-west-2, and us-east-2. Please check this documentation for updates in future.
Prerequisites
Before you can send logs using the HLC endpoint, you need to:
Create an IAM user with CloudWatch Logs permissions
Generate service-specific credentials (bearer token)
Create a log group and log stream
Enable bearer token authentication on the log group
Option 1: Simplified setup using the AWS console (recommended)
The AWS Management Console provides a streamlined workflow to generate API keys for HLC endpoint access.
To set up HLC endpoint access using the console
Sign in to the AWS Management Console.
Navigate to CloudWatch > Settings > Logs.
-
In the API Keys section, choose Generate API key.
-
For API key expiration, do one of the following:
Select an API key expiration duration of 1, 5, 30, 90, or 365 days.
Choose Custom duration to specify a custom API key expiration date.
Select Never expires (not recommended).
-
Choose Generate API key.
The console automatically:
Creates a new IAM user with appropriate permissions
Attaches the CloudWatchLogsAPIKeyAccess managed policy (includes
logs:PutLogEventsandlogs:CallWithBearerTokenpermissions)Generates service-specific credentials (API key)
-
Copy and securely save the displayed credentials:
API Key ID (Service-specific credential ID)
API Key Secret (Bearer token)
Important
Save the API Key Secret immediately. It cannot be retrieved later. If you lose it, you'll need to generate a new API key.
-
Create the log group and log stream where your logs will be stored:
# Create the log group aws logs create-log-group \ --log-group-name /aws/hlc-logs/my-application \ --region us-east-1 # Create the log stream aws logs create-log-stream \ --log-group-name /aws/hlc-logs/my-application \ --log-stream-name application-stream-001 \ --region us-east-1 -
Enable bearer token authentication on the log group:
aws logs put-bearer-token-authentication \ --log-group-identifier /aws/hlc-logs/my-application \ --bearer-token-authentication-enabled \ --region us-east-1Verify the configuration:
aws logs describe-log-groups \ --log-group-name-prefix /aws/hlc-logs/my-application \ --region us-east-1
Permissions included: The automatically created IAM user will have the following permissions:
logs:PutLogEvents– Send log events to CloudWatch Logslogs:CallWithBearerToken– Authenticate using bearer tokenkms:Describe*,kms:GenerateDataKey*,kms:Decrypt– Access KMS-encrypted log groups (with condition restricting to logs service)
Option 2: Manual setup
If you prefer more control over the IAM configuration or need to customize permissions, you can set up the HLC endpoint manually.
Step 1: Create an IAM user
Create an IAM user that will be used for log ingestion:
Sign in to the AWS Management Console and navigate to IAM.
In the left navigation pane, choose Users.
Choose Create user.
Enter a user name (for example,
cloudwatch-logs-hlc-user).Choose Next.
-
Attach one of the following IAM policies:
Option A: Use the managed policy (recommended)
Attach the CloudWatchLogsAPIKeyAccess managed policy.
Option B: Create a custom policy
Create and attach the following IAM policy:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "LogsAPIs", "Effect": "Allow", "Action": [ "logs:CallWithBearerToken", "logs:PutLogEvents" ], "Resource": "*" }, { "Sid": "KMSAPIs", "Effect": "Allow", "Action": [ "kms:Describe*", "kms:GenerateDataKey*", "kms:Decrypt" ], "Condition": { "StringEquals": { "kms:ViaService": [ "logs.*.amazonaws.com" ] } }, "Resource": "arn:aws:kms:*:*:key/*" } ] } Choose Next and then Create user.
Note
The KMS permissions are required if you plan to send logs to KMS-encrypted log groups. The condition restricts KMS access to only keys used via CloudWatch Logs service.
Step 2: Generate service-specific credentials (API key)
Generate the CloudWatch Logs API key using the CreateServiceSpecificCredential API. You can also use the create-service-specific-credential
To generate an API key with an expiration of 30 days:
aws iam create-service-specific-credential \ --user-name cloudwatch-logs-hlc-user \ --service-name logs.amazonaws.com \ --credential-age-days 30
The response is a ServiceSpecificCredential object. The ServiceCredentialSecret value is your CloudWatch Logs API key (bearer token).
Important
Store the ServiceCredentialSecret value securely, as you cannot retrieve it later. If you lose it, you'll need to generate a new API key.
Step 3: Create log group and log stream
Create the log group and log stream where your logs will be stored:
# Create the log group aws logs create-log-group \ --log-group-name /aws/hlc-logs/my-application \ --region us-east-1 # Create the log stream aws logs create-log-stream \ --log-group-name /aws/hlc-logs/my-application \ --log-stream-name application-stream-001 \ --region us-east-1
Step 4: Enable bearer token authentication
Enable bearer token authentication on the log group:
aws logs put-bearer-token-authentication \ --log-group-identifier /aws/hlc-logs/my-application \ --bearer-token-authentication-enabled \ --region us-east-1
Verify the configuration:
aws logs describe-log-groups \ --log-group-name-prefix /aws/hlc-logs/my-application \ --region us-east-1
Sending logs to the HLC endpoint
Endpoint format
The HLC endpoint URL follows this format:
https://logs.<region>.amazonaws.com/services/collector/event?logGroup=<name>&logStream=<name>[&entityName=<name>&entityEnvironment=<environment>]
Required parameters:
<region>– AWS Region (for example,us-east-1,eu-west-1)logGroup– URL-encoded log group namelogStream– URL-encoded log stream name
Optional parameters:
You can optionally associate your log events with a Service entity by
including the following query parameters. Because logs sent through the HLC endpoint
are custom telemetry, they are not automatically associated with an entity. By
providing these parameters, CloudWatch Logs creates an entity with
KeyAttributes.Type set to Service and associates it with
your log events. This enables the Explore related
feature in CloudWatch to correlate these logs with other telemetry (metrics, traces,
and logs) from the same service, making it easier to troubleshoot and monitor your
applications across different signal types. For more information about entities and
related telemetry, see Adding related information to custom telemetry.
entityName– The name of the service entity to associate with the log events. This value is stored as the entityKeyAttributes.Name(for example,my-applicationorapi.myservice.com).entityEnvironment– The environment where the service is hosted or what it belongs to. This value is stored as the entityKeyAttributes.Environment(for example,production,ec2:default, oreks:my-cluster/default).
Request format
Send logs using HTTP POST with the following headers and body:
Headers:
Authorization: Bearer <your-bearer-token>Content-Type: application/json
Body format:
The request body should be in JSON format with an array of events:
{ "event": [ { "time": 1730141374.001, "event": "Application started successfully", "host": "web-server-1", "source": "application.log", "severity": "info" }, { "time": 1730141374.457, "event": "User login successful", "host": "web-server-1", "source": "auth.log", "user": "john.doe" } ] }
Field descriptions:
time– Unix epoch timestamp with milliseconds (required)event– The log message or event data (required)host– Source hostname or identifier (optional)source– Log source identifier (optional)
Additional custom fields can be included as needed.
Example request
curl -X POST \ 'https://logs.<region>.amazonaws.com/services/collector/event?logGroup=/aws/hlc-logs/my-application&logStream=application-stream-001' \ -H "Authorization: Bearer <your-bearer-token>" \ -H "Content-Type: application/json" \ -d '{ "event": [ { "time": 1730141374.001, "event": "Application started", "host": "web-server-1", "severity": "info" } ] }'
Control permissions for generating and using CloudWatch Logs API keys
The generation and usage of CloudWatch Logs API keys is controlled by actions and condition keys in both the CloudWatch Logs and IAM services.
Controlling the generation of CloudWatch Logs API keys
The iam:CreateServiceSpecificCredential action controls the generation of a service-specific key (such as a CloudWatch Logs API key). You can scope this action to IAM users as a resource to limit the users for which a key can be generated.
You can use the following condition keys to impose conditions on the permission for the iam:CreateServiceSpecificCredential action:
iam:ServiceSpecificCredentialAgeDays – Lets you specify, in the condition, the key's expiration time in days. For example, you can use this condition key to only allow the creation of API keys that expire within 90 days.
iam:ServiceSpecificCredentialServiceName – Lets you specify, in the condition, the name of a service. For example, you can use this condition key to only allow the creation of API keys for CloudWatch Logs and not other services.
Controlling the usage of CloudWatch Logs API keys
The logs:CallWithBearerToken action controls the use of a CloudWatch Logs API key. To prevent an identity from using CloudWatch Logs API keys, attach a policy that denies the logs:CallWithBearerToken action to the IAM user associated with the key.
Example policies
Prevent an identity from generating and using CloudWatch Logs API keys
{ "Version": "2012-10-17", "Statement": [ { "Sid": "DenyCWLAPIKeys", "Effect": "Deny", "Action": [ "iam:CreateServiceSpecificCredential", "logs:CallWithBearerToken" ], "Resource": "*" } ] }
Warning
This policy will prevent the creation of credentials for all AWS services that support creating service-specific credentials. For more information, see Service-specific credentials for IAM users.
Prevent an identity from using CloudWatch Logs API keys
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Action": "logs:CallWithBearerToken", "Resource": "*" } ] }
Allow the creation of CloudWatch Logs keys only if they expire within 90 days
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "iam:CreateServiceSpecificCredential", "Resource": "arn:aws:iam::123456789012:user/username", "Condition": { "StringEquals": { "iam:ServiceSpecificCredentialServiceName": "logs.amazonaws.com" }, "NumericLessThanEquals": { "iam:ServiceSpecificCredentialAgeDays": "90" } } } ] }
Handle compromised CloudWatch Logs API keys
If your API key becomes compromised, you should revoke permissions to use it. You can use the following IAM API operations to manage compromised keys:
UpdateServiceSpecificCredential – Set the status of the key to inactive. You can reactivate the key later.
ResetServiceSpecificCredential – Reset the key. This generates a new password for the key.
DeleteServiceSpecificCredential – Delete the key permanently.
Note
To carry out these actions through the API, you must authenticate with AWS credentials and not with a CloudWatch Logs API key.
Change the status of a CloudWatch Logs API key
To deactivate a key, use the update-service-specific-credential
aws iam update-service-specific-credential \ --user-name cloudwatch-logs-hlc-user \ --service-specific-credential-id ACCA1234EXAMPLE1234 \ --status Inactive
To reactivate the key, change the status to Active.
Reset a CloudWatch Logs API key
If the value of your key has been compromised or you no longer have it, reset it using the reset-service-specific-credential
aws iam reset-service-specific-credential \ --service-specific-credential-id ACCA1234EXAMPLE1234
Delete a CloudWatch Logs API key
If you no longer need a key or it has expired, delete it using the delete-service-specific-credential
aws iam delete-service-specific-credential \ --service-specific-credential-id ACCA1234EXAMPLE1234
Attach IAM policies to remove permissions for using a CloudWatch Logs API key
To prevent an identity from making calls with a CloudWatch Logs API key, attach the following policy to the IAM user associated with the key:
{ "Version": "2012-10-17", "Statement": { "Effect": "Deny", "Action": "logs:CallWithBearerToken", "Resource": "*" } }
Logging API key usage with CloudTrail
You can use AWS CloudTrail to log data events for CloudWatch Logs API key usage. CloudWatch Logs emits AWS::Logs::LogGroupAuthorization data events for CallWithBearerToken calls, enabling you to audit when and how API keys are used to send logs.
To enable CloudTrail logging for CloudWatch Logs API key usage:
Note
The S3 bucket that you specify for the trail must have a bucket policy that allows CloudTrail to write log files to it. For more information, see Amazon S3 bucket policy for CloudTrail.
-
Create a trail:
aws cloudtrail create-trail \ --name cloudwatch-logs-api-key-audit \ --s3-bucket-name my-cloudtrail-bucket \ --region us-east-1 -
Configure advanced event selectors to capture CloudWatch Logs log group authorization events:
aws cloudtrail put-event-selectors \ --region us-east-1 \ --trail-name cloudwatch-logs-api-key-audit \ --advanced-event-selectors '[{ "Name": "CloudWatch Logs API key authorization events", "FieldSelectors": [ { "Field": "eventCategory", "Equals": ["Data"] }, { "Field": "resources.type", "Equals": ["AWS::Logs::LogGroupAuthorization"] } ] }]' -
Start trail logging:
aws cloudtrail start-logging \ --name cloudwatch-logs-api-key-audit \ --region us-east-1
Best practices
Batching events
For better performance and efficiency:
Batch multiple events in a single request when possible
Recommended batch size: 10–100 events per request
Maximum request size: 1 MB
Error handling
Implement proper error handling in your application. Common HTTP status codes:
200 OK– Logs successfully ingested400 Bad Request– Invalid request format or parameters401 Unauthorized– Invalid or expired bearer token403 Forbidden– Insufficient permissions404 Not Found– Log group or stream doesn't exist429 Too Many Requests– Rate limit exceeded500 Internal Server Error– Service error (retry with exponential backoff)
Limitations
Maximum event size: 256 KB per event
Maximum request size: 1 MB
Maximum events per request: 10,000
Log group names must follow CloudWatch Logs naming conventions
Bearer token authentication must be enabled on the log group