Version v0.6 of the documentation is no longer actively maintained. The site that you are currently viewing is an archived snapshot. For up-to-date documentation, see the latest version.

Logging

Add logging support for kubeflow

Amazon EKS control plane logging provides audit and diagnostic logs directly from the Amazon EKS control plane to CloudWatch Logs in your account. These logs make it easy for you to secure and run your clusters. You can select the exact log types you need, and logs are sent as log streams to a group for each Amazon EKS cluster in CloudWatch.

If you look at ${KUBEFLOW_SRC}/${KFAPP}/aws_config/cluster_features.sh, you will see following configuration:

CONTROL_PLANE_LOGGING=false
CONTROL_PLANE_LOGGING_COMPONENTS=api,audit,authenticator,controllerManager,scheduler

WORKER_NODE_GROUP_LOGGING=false

By default, cluster control plane logs and worker node group logs aren’t sent to CloudWatch Logs. You must enable each log type individually to send logs for your cluster.

Control Plane Logging

You can update CONTROL_PLANE_LOGGING=true to enable control plane logs and customize the components you want to collect logs from. Only these components are available and you have to use command between components.

  • api
  • audit
  • authenticator
  • controllerManager
  • scheduler

Open the CloudWatch Console. Choose the cluster that you want to view logs for. The log group name format is /aws/eks/${AWS_CLUSTER_NAME}/cluster.

Note: If you set CONTROL_PLANE_LOGGING=false, the value of CONTROL_PLANE_LOGGING_COMPONENTS will not be used.

Worker Node Group Logging

You can update WORKER_NODE_GROUP_LOGGING=true to enable worker node group logs and all pod logs are sent to CloudWatch. The log group name format is /eks/${AWS_CLUSTER_NAME}/containers.

If you want to change logs setting after you have created your cluster, please check here for details.


Last modified 24.04.2019: aws documentation clean up (9165810)