In traditional server environments, application logs are written to a file such as /var/log/app.log.
However, when working with Kubernetes, you need to collect logs for multiple transient pods (applications) across multiple nodes in the cluster, making this log collection method less than optimal.
Ways to collect logs in Kubernetes
Basic logging using stdout and stderr
The default Kubernetes logging framework captures the standard output (stdout) and standard error output (stderr) from each container on the node to a log file.
You can see the logs of a particular container by running the following commands:
By default, if a container restarts, the kubelet keeps one terminated container with its logs.
If a pod is evicted from the node, all corresponding containers are also evicted along with their logs.
Cluster-level logging using node logging agent
With the help of cluster-level logging setup, you can access the logs even after the pod is deleted.
The logging agent is commonly a container that exposes logs or pushes logs to a backend.
Because the logging agent must run on every node, the best practice is to run the agent as a DaemonSet.
Managing logs on different platforms:
Google Kubernetes Engine (GKE) cluster
For container and system logs, by default GKE deploys a per-node logging agent fluent-bit that reads container logs, adds helpful metadata, and then stores them in Cloud Logging. The logging agent checks for container logs in the following sources:
Standard output and standard error logs from containerized processes
kubelet and container runtime logs
Logs for system components, such as VM startup scripts
For events, GKE uses a deployment in the kube-system namespace which automatically collects events and sends them to Logging. For more details, see Managing GKE logs.
Use kubectl get pods -n kube-system to ensure the fluent-bit pods are up and running.
This command fetches the textPayload field from all the logs in the given range of timestamp of the container, pod, and cluster mentioned in the command, and populates the gcloudlogging.log file with that information.
Amazon EKS cluster
The Amazon EKS cluster does not come with any per-node logging agent installed. For logging purposes, you can install an agent similar to the fluent-bit daemonset to aggregate Kubernetes logs and send them to AWS CloudWatch Logs.
This command fetches the message field from all the logs in the given range of timestamp from the log stream mentioned in the command, and uses that information to populate the awsevents.log file.
On-Prem or Self-Managed cluster
There are several Kubernetes logging stacks that can be implemented in any kind of cluster, including:
EFK (Elasticsearch, FluentD, and Kibana)
ELK (Elasticsearch, Logstash, and Kibana)
PLG (Promtail, Loki, and Grafana)
PLG (Promtail, Loki, and Grafana)
The metadata discovery mechanism in Loki stack is useful in Kubernetes ecosystem when cost-control and storing logs for a long amount of time are priorities.
The PLG stack has the following components:
Promtail: Responsible for data ingestion into Loki. Runs on every node of your Kubernetes cluster.
Loki: The heart of the PLG stack; a data store optimized for logs.
Grafana: Visualizes logs stored in Loki. You can build individual dashboards in Grafana based on application logs and metrics computed from the logs.
Download the value file from grafana/loki-stack to configure based on the use case. In the following example, we customize the value file to deploy only Promtail, Loki, and Grafana.
For Loki, we configure persistence to store our logs on a running Kubernetes cluster with a size of 50 GB. The disk itself is provisioned automatically through the available CSI driver.
Depending on your Kubernetes setup or managed Kubernetes vendor, you may have to provide a different StorageClass. (Use kubectl get storageclass) to get a list of available StorageClasses in your cluster.
Verify Loki pods created by the above installation:
Terminal window
%kubectl-nlokigetpod
NAMEREADYSTATUSRESTARTSAGE
loki-00/1Running026s
loki-grafana-7db596b95-4jdrf1/2Running026s
loki-promtail-2fhdn1/1Running027s
loki-promtail-dh7g21/1Running027s
loki-promtail-hjdm81/1Running027s
Access Grafana from your local machine.
Find the Grafana password. By default, Grafana is protected with basic authentication You can get the password (username is admin) from the loki-grafana secret in the loki namespace with kubectl:
Terminal window
%kubectlgetsecretloki-grafana-nloki\
-otemplate\
--template'{{ index .data "admin-password" }}'|base64-d; echo
Port-Forward from localhost to Grafana
Knowing the username and password, you can port-forward with kubectl port-forward and access Grafana from your local machine through port 8080:
To see the Grafana dashboard, access localhost:8080. Use admin as the username, and the password you fetched from secret.
Use LogQL queries to explore the logs on the Grafana dashboard. For more details see the official LogQL documentation.
Use the logclicommand to fetch logs through command line.
Port-Forward from localhost to Loki pod
You can port-forward using kubectl port-forward to access Loki via logcli from your local machine through port 8080:
Terminal window
%kubectlgetpod-nloki-lapp=loki
NAMEREADYSTATUSRESTARTSAGE
loki-01/1Running05d20h
%kubectlport-forward-nlokiloki-08080:3100
Forwardingfrom127.0.0.1:8080 ->3100
Forwardingfrom [::1]:8080 -> 3100
For logcli to access Loki, export the Loki address and port number:
This command fetches all the logs in the given range of timestamp using the query in the command, and uses that information to populate the lokilogs.log file.