|
2 | 2 | include::_attributes/common-attributes.adoc[] |
3 | 3 | include::_attributes/attributes-openshift-dedicated.adoc[] |
4 | 4 | [id="log-forwarding"] |
5 | | -= About log forwarding |
| 5 | += About log collection and forwarding |
6 | 6 | :context: log-forwarding |
7 | 7 |
|
8 | 8 | toc::[] |
9 | 9 |
|
10 | | -By default, the {logging} sends container and infrastructure logs to the default internal log store defined in the `ClusterLogging` custom resource. However, it does not send audit logs to the internal store because it does not provide secure storage. If this default configuration meets your needs, you do not need to configure the Cluster Log Forwarder. |
| 10 | +Administrators can create `ClusterLogForwarder` resources that specify which logs are collected, how they are transformed, and where they are forwarded to. |
11 | 11 |
|
12 | | -To send logs to other log aggregators, you use the {product-title} Cluster Log Forwarder. This API enables you to send container, infrastructure, and audit logs to specific endpoints within or outside your cluster. In addition, you can send different types of logs to various systems so that various individuals can access each type. You can also enable Transport Layer Security (TLS) support to send logs securely, as required by your organization. |
| 12 | +`ClusterLogForwarder` resources can be used up to forward container, infrastructure, and audit logs to specific endpoints within or outside of a cluster. Transport Layer Security (TLS) is supported so that log forwarders can be configured to send logs securely. |
13 | 13 |
|
14 | | -[NOTE] |
15 | | -==== |
16 | | -To send audit logs to the default internal Elasticsearch log store, use the Cluster Log Forwarder as described in xref:../../logging/config/cluster-logging-log-store.adoc#cluster-logging-elasticsearch-audit_cluster-logging-log-store[Forward audit logs to the log store]. |
17 | | -==== |
| 14 | +Administrators can also authorize RBAC permissions that define which service accounts and users can access and forward which types of logs. |
18 | 15 |
|
19 | | -When you forward logs externally, the {logging} creates or modifies a Fluentd config map to send logs using your desired protocols. You are responsible for configuring the protocol on the external log aggregator. |
| 16 | +//// |
| 17 | +include::modules/log-forwarding-modes.adoc[leveloffset=+1] |
20 | 18 |
|
21 | | -// unused files - either include or delete |
22 | | -// cluster-logging-log-forwarding-disable.adoc |
| 19 | +[id="log-forwarding-enabling-multi-clf-mode"] |
| 20 | +== Enabling multi log forwarder mode for a cluster |
23 | 21 |
|
24 | | -include::modules/cluster-logging-collector-log-forwarding-about.adoc[leveloffset=+1] |
| 22 | +To use multi log forwarder mode, you must create a service account and cluster role bindings for that service account. You can then reference the service account in the `ClusterLogForwarder` resource to control access permissions. |
25 | 23 |
|
26 | | -include::modules/cluster-logging-forwarding-separate-indices.adoc[leveloffset=+1] |
| 24 | +include::modules/log-collection-rbac-permissions.adoc[leveloffset=+2] |
27 | 25 |
|
28 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-1.adoc[leveloffset=+1] |
| 26 | +[role="_additional-resources"] |
| 27 | +.Additional resources |
| 28 | +ifdef::openshift-enterprise[] |
| 29 | +* xref:../../authentication/using-rbac.adoc#using-rbac[Using RBAC to define and apply permissions] |
| 30 | +* xref:../../authentication/using-service-accounts-in-applications.adoc#using-service-accounts-in-applications[Using service accounts in applications] |
| 31 | +endif::[] |
| 32 | +* link:https://kubernetes.io/docs/reference/access-authn-authz/rbac/[Using RBAC Authorization Kubernetes documentation] |
29 | 33 |
|
30 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-2.adoc[leveloffset=+1] |
| 34 | +include::modules/logging-create-clf.adoc[leveloffset=+1] |
| 35 | +//// |
31 | 36 |
|
32 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-3.adoc[leveloffset=+1] |
| 37 | +[id="log-forwarding-audit-logs"] |
| 38 | +== Sending audit logs to the internal log store |
33 | 39 |
|
34 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-4.adoc[leveloffset=+1] |
| 40 | +By default, the {logging} sends container and infrastructure logs to the default internal log store defined in the `ClusterLogging` custom resource. However, it does not send audit logs to the internal store because it does not provide secure storage. If this default configuration meets your needs, you do not need to configure the Cluster Log Forwarder. |
35 | 41 |
|
36 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-5.adoc[leveloffset=+1] |
| 42 | +[NOTE] |
| 43 | +==== |
| 44 | +To send audit logs to the internal Elasticsearch log store, use the Cluster Log Forwarder as described in xref:../../logging/config/cluster-logging-log-store.adoc#cluster-logging-elasticsearch-audit_cluster-logging-log-store[Forward audit logs to the log store]. |
| 45 | +==== |
37 | 46 |
|
38 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-6.adoc[leveloffset=+1] |
| 47 | +include::modules/cluster-logging-collector-log-forwarding-about.adoc[leveloffset=+1] |
39 | 48 |
|
40 | | -include::modules/cluster-logging-collector-log-forwarding-supported-plugins-5-7.adoc[leveloffset=+1] |
| 49 | +include::modules/cluster-logging-forwarding-separate-indices.adoc[leveloffset=+1] |
41 | 50 |
|
42 | 51 | include::modules/cluster-logging-collector-log-forward-es.adoc[leveloffset=+1] |
43 | 52 |
|
|
0 commit comments