Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/aws-samples/one-observability-demo
Sample microservice based application demonstrating observability capabilities on AWS
https://github.com/aws-samples/one-observability-demo
amazon-api-gateway amazon-ecs amazon-eks amazon-sns amazon-sqs aws aws-lambda aws-xray awsfargate awstepfunctions cloudwatch csharp golang java nodejs observability observability-demo opentelemetry python servicelens
Last synced: 1 day ago
JSON representation
Sample microservice based application demonstrating observability capabilities on AWS
- Host: GitHub
- URL: https://github.com/aws-samples/one-observability-demo
- Owner: aws-samples
- License: mit-0
- Created: 2020-07-22T14:13:59.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2024-12-31T19:35:42.000Z (27 days ago)
- Last Synced: 2025-01-19T05:05:20.131Z (8 days ago)
- Topics: amazon-api-gateway, amazon-ecs, amazon-eks, amazon-sns, amazon-sqs, aws, aws-lambda, aws-xray, awsfargate, awstepfunctions, cloudwatch, csharp, golang, java, nodejs, observability, observability-demo, opentelemetry, python, servicelens
- Language: TypeScript
- Homepage: https://observability.workshop.aws/
- Size: 158 MB
- Stars: 233
- Watchers: 9
- Forks: 126
- Open Issues: 37
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
## One Observability Demo
This repo contains a sample application which is used in the One Observability Demo workshop here - https://observability.workshop.aws/
## Security
See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.
## Instructions
To deploy this workshop on your own account you need to have an IAM role with elevated priviliges and the `aws-cli` installed. Then, from the root
of the repository run the following command:```
aws cloudformation create-stack --stack-name Observability-Workshop --template-body file://codepipeline-stack.yaml --capabilities CAPABILITY_NAMED_IAM --parameters ParameterKey=UserRoleArn,ParameterValue=$(aws iam get-role --role-name $(aws sts get-caller-identity --query Arn --output text | awk -F/ '{print $(NF-1)}') --query Role.Arn --output text)
```You can replace the role specified in the paramter `UserRoleArn` with any other role with access to AWS CloudShell if you need so.
## License
This library is licensed under the MIT-0 License. See the LICENSE file.