Kubernetes Fury Logging
Kubernetes Fury Logging provides a logging stack for the Kubernetes Fury Distribution (KFD).
If you are new to KFD please refer to the official documentation on how to get started with KFD.
Overview
Kubernetes Fury Logging uses a collection of open source tools to provide the most resilient and robust logging stack for the cluster.
The central piece of the stack is the CNCF certified open source search engine elasticsearch, combined with its analytics and visualization platform kibana. The logs are collected using a node-level data collection and enrichment agent fluentbit(deployed as Daemonsets
), pushing it to the Elasticsearch via fluentd.
Following is a high level design diagram of the module:
All the components are deployed in the logging
namespace in the cluster.
Packages
The following packages are included in the Fury Kubernetes Logging katalog:
Package | Version | Description |
---|---|---|
cerebro | 0.9.4 | Web admin tool that helps you manage your Elasticsearch cluster via a graphical user interface |
curator | 5.8.4 | Manages elasticserach indices and snapshots, alongwith configurations to set the retention log policies |
curator-s3 | 5.8.4 | curator with S3 compliant bucket support |
elasticsearch-single | 7.16.2 | Single node elasticsearch deployment |
elasticsearch-triple | 7.16.2 | Three node high-availability elasticsearch deployment |
fluentd | 1.14.2 | Data collector for unified logging that can store collected data in Elasticsearch |
kibana | 7.16.2 | Analytics and visualization platform for Elasticsearch |
Click on each package to see its full documentation.
Compatibility
Kubernetes Version | Compatibility | Notes |
---|---|---|
1.20.x | ✅ | No known issues |
1.21.x | ✅ | No known issues |
1.22.x | ✅ | No known issues |
1.23.x | ⚠️ | Conformance tests passed. Not officially supported. |
Check the compatibility matrix for additional informations about previous releases of the modules.
Usage
Prerequisites
Tool | Version | Description |
---|---|---|
furyctl | >=0.6.0 | The recommended tool to download and manage KFD modules and their packages. To learn more about furyctl read the official documentation. |
kustomize | >=3.5.0 | Packages are customized using kustomize . To learn how to create your customization layer with kustomize , please refer to the repository. |
Deployment
- List the packages you want to deploy and their version in a
Furyfile.yml
bases:
- name: logging/cerebro
version: "v1.10.3"
- name: logging/curator
version: "v1.10.3"
- name: logging/elasticsearch-single
version: "v1.10.3"
- name: logging/fluentd
version: "v1.10.3"
- name: logging/kibana
version: "v1.10.3"
See
furyctl
documentation for additional details aboutFuryfile.yml
format.
-
Execute
furyctl vendor -H
to download the packages -
Inspect the download packages under
./vendor/katalog/logging
. -
Define a
kustomization.yaml
that includes the./vendor/katalog/logging
directory as resource.
resources:
- ./vendor/katalog/logging/cerebro
- ./vendor/katalog/logging/curator
- ./vendor/katalog/logging/elasticsearch-single
- ./vendor/katalog/logging/fluentd
- ./vendor/katalog/logging/kibana
- To deploy the packages to your cluster, execute:
kustomize build . | kubectl apply -f -
Common Customisations
Setup a high-availability three-node elasticsearch
Logging module offers an out of the box, highly-available setup for elasticsearch
instead of a single node version. To set this up, in the Furyfile
and kustomization
, you can replace elasticsearch-single
with elasticsearch-triple
.
Setup curator with datastore in an s3 compliant bucket
To setup curator
with s3
compliant bucket support, we provide curator-s3
. To set it up, instead of curator
, use curator-s3
in Furyfile
and kustomization
in the above defined deployment step.
To configure the s3
bucket, you will have to edit the file secret-es-backup.env
with the following content, with the right configuration secrets:
AWS_ACCESS_KEY_ID=AAAA
AWS_REGION=eu-west-1
AWS_SECRET_ACCESS_KEY=myKey
S3_BUCKET_NAME=my-s3_bucket