Logging#
Increase the Log Level on an ESS Microservice#
ESS logging is configured through Quarkus.
By default, ESS microservices log at the INFO
level. To change a
service’s log level, update the QUARKUS_LOG_LEVEL
environment
variable for that service. For available log levels, see
https://quarkus.io/guides/logging#logging-levels.
To change the logging level for a service and deploy it to the Kubernetes (K8s) cluster:
Update the
QUARKUS_LOG_LEVEL
value in the service’s<service>-deployment.yaml
file used to deploy into your Kubernetes cluster:- name: QUARKUS_LOG_LEVEL value: <New Log Level>
Apply the changes to the cluster:
kubectl apply -f <path to yaml>
This restarts the service with the new log level.
For more information on Quarkus logging, see https://quarkus.io/guides/logging.
Configure Auditing#
ESS services support auditing to log various system activities.
To set up specific service for auditing, see:
To configure audit messages for these services, see:
Set up LDP Service for Auditing#
The following properties are available to set up LDP service to enable auditing.
Auditing Property for LDP |
Description |
---|---|
|
The name of the audit handler for the LDP service.
Default value is unset; i.e., auditing is off by default. To configure as an environment variable, use the
|
|
The Default value is Alternatively, to configure as an environment variable, use
Important The Audit messages are sent over TLS. The LDP service must import the Syslog server’s certificate into LDP’s cacerts file. |
To configure the audit messages, see also:
Set up Solid OIDC Broker Service for Auditing#
The following properties are available to set up the Solid OIDC Broker service for auditing.
Auditing Property for the Solid OIDC Broker Service |
Description |
---|---|
|
To enable or disable auditing on the Solid OIDC Broker.
Default value is unset. |
|
The Syslog server’s host name to which to send the audit messages. Default value is |
|
Specifies the Syslog’s server’s port. Default value is |
|
Specifies the location of the Solid OIDC Broker Service’s trust store file. Important The Audit messages are sent over TLS. The Solid OIDC Broker Service must import the Syslog server’s certificate into the trust store file. Default value is unset. |
|
Specifies the password of the Solid OIDC Broker Service’s trust store file. |
To configure the audit messages for the service, see:
Configure Audit Messages#
The following properties are available to configure the audit messages for the services. You can set these properties as system or environmental variables.
Property |
Description |
---|---|
|
A string or a comma-separated list of strings that determine the headers to include in request.* event messages. Only the specified headers will be included from the audit messages. Default value: |
|
A string or a comma-separated list of strings that determine the configuration properties to include in the service.configuration event messages. For each specified string, the Audit system performs a case-insensitive starts-with match on the property names. Only those properties that match are included in the audit messages. For example, a value of Default values for:
|
|
A string or a comma-separated list of strings that determine the properties (e.g., passwords, secret keys, etc.) to mask in the audit log messages. For each specified string, the Audit system performs a case-insensitive search for the string in the property names. Those properties whose names contain the string are masked in the audit messages. For example, a value of Default values for:
|
See also:
Retrieve Logs#
ESS consists of multiple K8s pods (instances) running on multiple nodes (servers) in a K8s cluster. Kubernetes manages the orchestration of all these containers. You can retrieve the logs directly from Kubernetes or integrate into a centralized logging platform.
Retrieve Logs Directly from Kubernetes#
To retrieve the logs displayed to stdout
, run the kubectl logs
command:
kubectl logs --follow <service app deployment>
Centralized Logging to a Backend Logging System#
As your ESS deployment grows, logging to a centralized backend logging system can help manage your logs. You can set up a centralized logging system for your ESS deployment in Kubernetes. For more information, see Kubernetes: Logging.
See also: