apiVersion: logging.openshift.io/v1
kind: ClusterLogging
metadata:
# ...
spec:
# ...
collection:
type: <log_collector_type> (1)
resources: {}
tolerations: {}
# ...
Logging for Red Hat OpenShift collects operations and application logs from your cluster and enriches the data with Kubernetes pod and project metadata.
All supported modifications to the log collector can be performed though the spec.collection
stanza in the ClusterLogging
custom resource (CR).
You can configure which log collector type your logging uses by modifying the ClusterLogging
custom resource (CR).
Fluentd is deprecated and is planned to be removed in a future release. Red Hat provides bug fixes and support for this feature during the current release lifecycle, but this feature no longer receives enhancements. As an alternative to Fluentd, you can use Vector instead. |
You have administrator permissions.
You have installed the OpenShift CLI (oc
).
You have installed the Red Hat OpenShift Logging Operator.
You have created a ClusterLogging
CR.
Modify the ClusterLogging
CR collection
spec:
ClusterLogging
CR exampleapiVersion: logging.openshift.io/v1
kind: ClusterLogging
metadata:
# ...
spec:
# ...
collection:
type: <log_collector_type> (1)
resources: {}
tolerations: {}
# ...
1 | The log collector type you want to use for the logging. This can be vector or fluentd . |
Apply the ClusterLogging
CR by running the following command:
$ oc apply -f <filename>.yaml
In logging version 5.8 and newer versions, the LogFileMetricExporter is no longer deployed with the collector by default. You must manually create a LogFileMetricExporter
custom resource (CR) to generate metrics from the logs produced by running containers.
If you do not create the LogFileMetricExporter
CR, you may see a No datapoints found message in the Red Hat OpenShift service on AWS web console dashboard for Produced Logs.
You have administrator permissions.
You have installed the Red Hat OpenShift Logging Operator.
You have installed the OpenShift CLI (oc
).
Create a LogFileMetricExporter
CR as a YAML file:
LogFileMetricExporter
CRapiVersion: logging.openshift.io/v1alpha1
kind: LogFileMetricExporter
metadata:
name: instance
namespace: openshift-logging
spec:
nodeSelector: {} (1)
resources: (2)
limits:
cpu: 500m
memory: 256Mi
requests:
cpu: 200m
memory: 128Mi
tolerations: [] (3)
# ...
1 | Optional: The nodeSelector stanza defines which nodes the pods are scheduled on. |
2 | The resources stanza defines resource requirements for the LogFileMetricExporter CR. |
3 | Optional: The tolerations stanza defines the tolerations that the pods accept. |
Apply the LogFileMetricExporter
CR by running the following command:
$ oc apply -f <filename>.yaml
A logfilesmetricexporter
pod runs concurrently with a collector
pod on each node.
Verify that the logfilesmetricexporter
pods are running in the namespace where you have created the LogFileMetricExporter
CR, by running the following command and observing the output:
$ oc get pods -l app.kubernetes.io/component=logfilesmetricexporter -n openshift-logging
NAME READY STATUS RESTARTS AGE
logfilesmetricexporter-9qbjj 1/1 Running 0 2m46s
logfilesmetricexporter-cbc4v 1/1 Running 0 2m46s
The log collector allows for adjustments to both the CPU and memory limits.
Edit the ClusterLogging
custom resource (CR) in the openshift-logging
project:
$ oc -n openshift-logging edit ClusterLogging instance
apiVersion: logging.openshift.io/v1
kind: ClusterLogging
metadata:
name: instance
namespace: openshift-logging
spec:
collection:
type: fluentd
resources:
limits: (1)
memory: 736Mi
requests:
cpu: 100m
memory: 736Mi
# ...
1 | Specify the CPU and memory limits and requests as needed. The values shown are the default values. |
The Red Hat OpenShift Logging Operator deploys a service for each configured input receiver so that clients can write to the collector. This service exposes the port specified for the input receiver. The service name is generated based on the following:
For multi log forwarder ClusterLogForwarder
CR deployments, the service name is in the format <ClusterLogForwarder_CR_name>-<input_name>
. For example, example-http-receiver
.
For legacy ClusterLogForwarder
CR deployments, meaning those named instance
and located in the openshift-logging
namespace, the service name is in the format collector-<input_name>
. For example, collector-http-receiver
.
You can configure your log collector to listen for HTTP connections and receive audit logs as an HTTP server by specifying http
as a receiver input in the ClusterLogForwarder
custom resource (CR). This enables you to use a common log store for audit logs that are collected from both inside and outside of your Red Hat OpenShift service on AWS cluster.
You have administrator permissions.
You have installed the OpenShift CLI (oc
).
You have installed the Red Hat OpenShift Logging Operator.
You have created a ClusterLogForwarder
CR.
Modify the ClusterLogForwarder
CR to add configuration for the http
receiver input:
ClusterLogForwarder
CR if you are using a multi log forwarder deploymentapiVersion: logging.openshift.io/v1beta1
kind: ClusterLogForwarder
metadata:
# ...
spec:
serviceAccountName: <service_account_name>
inputs:
- name: http-receiver (1)
receiver:
type: http (2)
http:
format: kubeAPIAudit (3)
port: 8443 (4)
pipelines: (5)
- name: http-pipeline
inputRefs:
- http-receiver
# ...
1 | Specify a name for your input receiver. |
2 | Specify the input receiver type as http . |
3 | Currently, only the kube-apiserver webhook format is supported for http input receivers. |
4 | Optional: Specify the port that the input receiver listens on. This must be a value between 1024 and 65535 . The default value is 8443 if this is not specified. |
5 | Configure a pipeline for your input receiver. |
ClusterLogForwarder
CR if you are using a legacy deploymentapiVersion: logging.openshift.io/v1
kind: ClusterLogForwarder
metadata:
name: instance
namespace: openshift-logging
spec:
inputs:
- name: http-receiver (1)
receiver:
type: http (2)
http:
format: kubeAPIAudit (3)
port: 8443 (4)
pipelines: (5)
- inputRefs:
- http-receiver
name: http-pipeline
# ...
1 | Specify a name for your input receiver. |
2 | Specify the input receiver type as http . |
3 | Currently, only the kube-apiserver webhook format is supported for http input receivers. |
4 | Optional: Specify the port that the input receiver listens on. This must be a value between 1024 and 65535 . The default value is 8443 if this is not specified. |
5 | Configure a pipeline for your input receiver. |
Apply the changes to the ClusterLogForwarder
CR by running the following command:
$ oc apply -f <filename>.yaml
Fluentd is deprecated and is planned to be removed in a future release. Red Hat provides bug fixes and support for this feature during the current release lifecycle, but this feature no longer receives enhancements. As an alternative to Fluentd, you can use Vector instead. |
Logging includes multiple Fluentd parameters that you can use for tuning the performance of the Fluentd log forwarder. With these parameters, you can change the following Fluentd behaviors:
Chunk and chunk buffer sizes
Chunk flushing behavior
Chunk forwarding retry behavior
Fluentd collects log data in a single blob called a chunk. When Fluentd creates a chunk, the chunk is considered to be in the stage, where the chunk gets filled with data. When the chunk is full, Fluentd moves the chunk to the queue, where chunks are held before being flushed, or written out to their destination. Fluentd can fail to flush a chunk for a number of reasons, such as network issues or capacity issues at the destination. If a chunk cannot be flushed, Fluentd retries flushing as configured.
By default in Red Hat OpenShift service on AWS, Fluentd uses the exponential backoff method to retry flushing, where Fluentd doubles the time it waits between attempts to retry flushing again, which helps reduce connection requests to the destination. You can disable exponential backoff and use the periodic retry method instead, which retries flushing the chunks at a specified interval.
These parameters can help you determine the trade-offs between latency and throughput.
To optimize Fluentd for throughput, you could use these parameters to reduce network packet count by configuring larger buffers and queues, delaying flushes, and setting longer times between retries. Be aware that larger buffers require more space on the node file system.
To optimize for low latency, you could use the parameters to send data as soon as possible, avoid the build-up of batches, have shorter queues and buffers, and use more frequent flush and retries.
You can configure the chunking and flushing behavior using the following parameters in the ClusterLogging
custom resource (CR). The parameters are then automatically added to the Fluentd config map for use by Fluentd.
These parameters are:
|
Parameter | Description | Default |
---|---|---|
|
The maximum size of each chunk. Fluentd stops writing data to a chunk when it reaches this size. Then, Fluentd sends the chunk to the queue and opens a new chunk. |
|
|
The maximum size of the buffer, which is the total size of the stage and the queue. If the buffer size exceeds this value, Fluentd stops adding data to chunks and fails with an error. All data not in chunks is lost. |
Approximately 15% of the node disk distributed across all outputs. |
|
The interval between chunk flushes. You can use |
|
|
The method to perform flushes:
|
|
|
The number of threads that perform chunk flushing. Increasing the number of threads improves the flush throughput, which hides network latency. |
|
|
The chunking behavior when the queue is full:
|
|
|
The maximum time in seconds for the |
|
|
The retry method when flushing fails:
|
|
|
The maximum time interval to attempt retries before the record is discarded. |
|
|
The time in seconds before the next chunk flush. |
|
For more information on the Fluentd chunk lifecycle, see Buffer Plugins in the Fluentd documentation.
Edit the ClusterLogging
custom resource (CR) in the openshift-logging
project:
$ oc edit ClusterLogging instance
Add or modify any of the following parameters:
apiVersion: logging.openshift.io/v1
kind: ClusterLogging
metadata:
name: instance
namespace: openshift-logging
spec:
collection:
fluentd:
buffer:
chunkLimitSize: 8m (1)
flushInterval: 5s (2)
flushMode: interval (3)
flushThreadCount: 3 (4)
overflowAction: throw_exception (5)
retryMaxInterval: "300s" (6)
retryType: periodic (7)
retryWait: 1s (8)
totalLimitSize: 32m (9)
# ...
1 | Specify the maximum size of each chunk before it is queued for flushing. |
2 | Specify the interval between chunk flushes. |
3 | Specify the method to perform chunk flushes: lazy , interval , or immediate . |
4 | Specify the number of threads to use for chunk flushes. |
5 | Specify the chunking behavior when the queue is full: throw_exception , block , or drop_oldest_chunk . |
6 | Specify the maximum interval in seconds for the exponential_backoff chunk flushing method. |
7 | Specify the retry type when chunk flushing fails: exponential_backoff or periodic . |
8 | Specify the time in seconds before the next chunk flush. |
9 | Specify the maximum size of the chunk buffer. |
Verify that the Fluentd pods are redeployed:
$ oc get pods -l component=collector -n openshift-logging
Check that the new values are in the fluentd
config map:
$ oc extract configmap/collector-config --confirm
<buffer>
@type file
path '/var/lib/fluentd/default'
flush_mode interval
flush_interval 5s
flush_thread_count 3
retry_type periodic
retry_wait 1s
retry_max_interval 300s
retry_timeout 60m
queued_chunks_limit_size "#{ENV['BUFFER_QUEUE_LIMIT'] || '32'}"
total_limit_size "#{ENV['TOTAL_LIMIT_SIZE_PER_BUFFER'] || '8589934592'}"
chunk_limit_size 8m
overflow_action throw_exception
disable_chunk_backup true
</buffer>