What's new
Version 4.8
The following are the highlights and main changes of Logging operator 4.8. For a complete list of changes and bugfixes, see the Logging operator 4.8 releases page and the Logging operator 4.8 release blog post.
Routing based on namespace labels
In your Fluentd ClusterFlows you can now route your messages based on namespace labels.
Note: This feature requires a new Fluentd image:
ghcr.io/kube-logging/fluentd:v1.16-4.8-full
. If you’re using a custom Fluentd image, make sure to update it!
If you have enabled namespace labeling in Fluent Bit, you can use namespace labels in your selectors, for example:
apiVersion: logging.banzaicloud.io/v1beta1
kind: ClusterFlow
metadata:
name: dev-logs
spec:
match:
- select:
namespace_labels:
tenant: dev
globalOutputRefs:
- example
Breaking change
If you’re using hostTailer
or eventTailer
and configured it through the helm chart’s logging.hostTailer
or logging.eventTailer
option, note that now both components have an enabled
flag. Set this flag to true if you used any of these components from the chart. For details, see the pull request.
Go templates in metrics-probe label values
You can now use go templates that resolve to destination information (name
, namespace
, scope:local/global
and the logging
name) in metrics-probe label values. For example:
apiVersion: logging.banzaicloud.io/v1beta1
kind: SyslogNGClusterFlow
metadata:
name: all
spec:
match: {}
outputMetrics:
- key: custom_output
labels:
flow: all
# define your own label for output name
my-key-for-the-output: "{{ .Destination.Name }}"
# do not add the output_name label to the metric
output_name: ""
globalOutputRefs:
- http
Other changes
-
You can set the maximal number of TCP connections Fluent Bit can open towards the aggregator to avoid overloading it.
spec: controlNamespace: default fluentbit: # The below network configurations allow fluentbit to retry indefinitely on a limited number of connections to avoid overloading the aggregator (syslog-ng in this case) network: maxWorkerConnections: 2 syslogng_output: Workers: 2 Retry_Limit: "no_limits"
-
In the Logging operator helm chart you can include extra manifests to deploy together with the chart using the
extraManifests
field, similarly to other popular charts.
Version 4.7
The following are the highlights and main changes of Logging operator 4.7. For a complete list of changes and bugfixes, see the Logging operator 4.7 releases page and the Logging operator 4.7 release blog post.
Breaking change for Fluentd
When using the Fluentd aggregator, Logging operator has overridden the default chunk_limit_size
for the Fluentd disk buffers. Since Fluentd updated the default value to a much saner default, Logging operator won’t override that to avoid creating too many small buffer chunks. (Having too many small chunks can lead to too many open files
errors.)
This isn’t an intrusive breaking change, it only affects your deployments if you intentionally or accidentally depended on this value.
JSON output format for Fluentd
In addition to the default text format, Fluentd can now format the output as JSON:
spec:
fluentd:
logFormat: json
Disk buffer support for more outputs
Enabling disk buffers wasn’t available for some of the outputs, this has been fixed for: Gelf, Elasticsearch, OpenObserve, S3, Splunk HEC.
Compression support for Elasticsearch
The Elasticsearch output of the Fluentd aggregator now supports compressing the output data using gzip. You can use the compression_level
option to set default_compression
, best_compression
, or best_speed
. By default, compression is disabled.
Protected ClusterOutputs for Fluentd
By default, ClusterOutputs can be referenced in any Flow. In certain scenarios, this means that users can send logs from Flows to the ClusterOutput, possibly spamming the output with user logs. From now on, you can set the protected
flag for ClusterOutputs and prevent Flows from sending logs to the protected ClusterOutput.
ConfigCheck settings for aggregators
You can now specify configCheck
settings globally in the Loggings CRD, and override them if needed on the aggregator level in the Fluentd or SyslogNG CRD.
Limit connections for Fluent Bit
You can now limit the number of TCP connections that each Fluent Bit worker can open toward the aggregator endpoints. The max_worker_connections
is set to unlimited by default, and should be used together with the Workers
option (which defaults to 2 according to the Fluent Bit documentation). The following example uses a single worker with a single connection:
kind: FluentbitAgent
spec:
network:
maxWorkerConnections: 1
syslogng_output:
Workers: 1
Version 4.6
The following are the highlights and main changes of Logging operator 4.6. For a complete list of changes and bugfixes, see the Logging operator 4.6 releases page and the Logging operator 4.6 release blog post.
Fluent Bit hot reload
As a Fluent Bit restart can take a long time when there are many files to index, Logging operator now supports hot reload for Fluent Bit to reload its configuration on the fly.
You can enable hot reloads under the Logging’s spec.fluentbit.configHotReload
(legacy method) option, or the new FluentbitAgent’s spec.configHotReload
option:
apiVersion: logging.banzaicloud.io/v1beta1
kind: FluentbitAgent
metadata:
name: reload-example
spec:
configHotReload: {}
You can configure the resources
and image
options:
apiVersion: logging.banzaicloud.io/v1beta1
kind: FluentbitAgent
metadata:
name: reload-example
spec:
configHotReload:
resources: ...
image:
repository: ghcr.io/kube-logging/config-reloader
tag: v0.0.5
Many thanks to @aslafy-z for contributing this feature!
VMware Aria Operations output for Fluentd
When using the Fluentd aggregator with the Logging operator, you can now send your logs to VMware Aria Operations for Logs. This output uses the vmwareLogInsight plugin.
Here is a sample output snippet:
spec:
vmwareLogInsight:
scheme: https
ssl_verify: true
host: MY_LOGINSIGHT_HOST
port: 9543
agent_id: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
log_text_keys:
- log
- msg
- message
http_conn_debug: false
Many thanks to @logikone for contributing this feature!
VMware Log Intelligence output for Fluentd
When using the Fluentd aggregator with the Logging operator, you can now send your logs to VMware Log Intelligence. This output uses the vmware_log_intelligence plugin.
Here is a sample output snippet:
spec:
vmwarelogintelligence:
endpoint_url: https://data.upgrade.symphony-dev.com/le-mans/v1/streams/ingestion-pipeline-stream
verify_ssl: true
http_compress: false
headers:
content_type: "application/json"
authorization:
valueFrom:
secretKeyRef:
name: vmware-log-intelligence-token
key: authorization
structure: simple
buffer:
chunk_limit_records: 300
flush_interval: 3s
retry_max_times: 3
Many thanks to @zrobisho for contributing this feature!
Kubernetes namespace labels and annotations
Logging operator 4.6 supports the new Fluent Bit Kubernetes filter options that will be released in Fluent Bit 3.0. That way you’ll be able to enrich your logs with Kubernetes namespace labels and annotations right at the source of the log messages.
Fluent Bit 3.0 hasn’t been released yet (at the time of this writing), but you can use a developer image to test the feature, using a FluentbitAgent
resource like this:
apiVersion: logging.banzaicloud.io/v1beta1
kind: FluentbitAgent
metadata:
name: namespace-label-test
spec:
filterKubernetes:
namespace_annotations: "On"
namespace_labels: "On"
image:
repository: ghcr.io/fluent/fluent-bit
tag: 3.0.0
Other changes
- Enabling ServiceMonitor checks if Prometheus is already available.
- You can now use a custom PVC without a template for the statefulset.
- You can now configure PodDisruptionBudget for Fluentd.
- Event tailer metrics are now automatically exposed.
- You can configure timeout-based configuration checks using the
logging.configCheck
object of thelogging-operator
chart. - You can now specify the event tailer image to use in the
logging-operator
chart. - Fluent Bit can now automatically delete irrecoverable chunks.
- The Fluentd statefulset and its components created by the Logging operator now include the whole securityContext object.
- The Elasticsearch output of the syslog-ng aggregator now supports the template option.
- To avoid problems that might occur when a tenant has a faulty output and backpressure kicks in, Logging operator now creates a dedicated tail input for each tenant.
Removed feature
We have removed support for Pod Security Policies (PSPs), which were deprecated in Kubernetes v1.21, and removed from Kubernetes in v1.25.
Note that the API was left intact, it just doesn’t do anything.
Version 4.5
The following are the highlights and main changes of Logging operator 4.5. For a complete list of changes and bugfixes, see the Logging operator 4.5 releases page.
Standalone FluentdConfig and SyslogNGConfig CRDs
Starting with Logging operator version 4.5, you can either configure Fluentd in the Logging
CR, or you can use a standalone FluentdConfig
CR. Similarly, you can use a standalone SyslogNGConfig
CRD to configure syslog-ng.
These standalone CRDs are namespaced resources that allow you to configure the Fluentd/syslog-ng aggregator in the control namespace, separately from the Logging resource. That way you can use a multi-tenant model, where tenant owners are responsible for operating their own aggregator, while the Logging resource is in control of the central operations team.
For details, see Configure Fluentd and Configure syslog-ng.
New syslog-ng features
When using syslog-ng as the log aggregator, you can now:
- Send data to OpenObserve
- Use a custom date-parser
- Create custom log metrics for sources and outputs
- Set the permitted SSL versions in HTTP based outputs
- Configure the maxConnections parameter of the sources
New Fluentd features
When using Fluentd as the log aggregator, you can now:
- Use the useragent Fluent filter
- Configure sidecar container in Fluentd pods
- Configure the security-context of every container
- Set which Azure Cloud to use (for example, AzurePublicCloud), when using the Azure Storage output
- Customize the
image
to use in event and host tailers
Other changes
- LoggingStatus now includes the number (problemsCount) and the related watchNamespaces to help troubleshooting
Image and dependency updates
For the list of images used in Logging operator, see Images used by Logging operator.
Version 4.4
The following are the highlights and main changes of Logging operator 4.4. For a complete list of changes and bugfixes, see the Logging operator 4.4 releases page.
New syslog-ng features
When using syslog-ng as the log aggregator, you can now use the following new outputs:
- ElasticSearch
- Grafana Loki
- MongoDB
- Redis
- Amazon S3
- Splunk HEC
- The HTTP output now supports the
log-fifo-size
,response-action
, andtimeout
fields.
You can now use the metrics-probe()
parser of syslog-ng in syslogNGFLow and SyslogNGClusterFlow. For details, see MetricsProbe.
Multitenancy with namespace-based routing
Logging operator now supports namespace based routing for efficient aggregator-level multi-tenancy.
In the project repository you can:
- find an overview about multitenancy.
- find more detailed information about the new LoggingRoute resource that enables this new behaviour.
- find a simple example to demonstrate the new behaviour
On a side note, nodegroup level isolation for hard multitenancy is also supported, see the Nodegroup-based multitenancy example.
Forwarder logs
Fluent-bit now doesn’t process the logs of the Fluentd and syslog-ng forwarders by default to avoid infinitely growing message loops. With this change, you can access Fluentd and syslog-ng logs simply by running kubectl logs <name-of-forwarder-pod>
In a future Logging operator version the logs of the aggregators will also be available for routing to external outputs.
Timeout-based configuration checks
Timeout-based configuration checks are different from the normal method: they start a Fluentd or syslog-ng instance without the dry-run or syntax-check flags, so output plugins or destination drivers actually try to establish connections and will fail if there are any issues , for example, with the credentials.
Add the following to you Logging
resource spec:
spec:
configCheck:
strategy: StartWithTimeout
timeoutSeconds: 5
Istio support
For jobs/individual pods that run to completion, Istio sidecar injection needs to be disabled, otherwise the affected pods would live forever with the running sidecar container. Configuration checkers and Fluentd drainer pods can be configured with the label sidecar.istio.io/inject
set to false
. You can configure Fluentd drainer labels in the Logging spec.
Improved buffer metrics
The buffer metrics are now available for both the Fluentd and the SyslogNG based aggregators.
The sidecar configuration has been rewritten to add a new metric and improve performance by avoiding unnecessary cardinality.
The name of the metric has been changed as well, but the original metric was kept in place to avoid breaking existing clients.
Metrics currently supported by the sidecar
Old
+# HELP node_buffer_size_bytes Disk space used [deprecated]
+# TYPE node_buffer_size_bytes gauge
+node_buffer_size_bytes{entity="/buffers"} 32253
New
+# HELP logging_buffer_files File count
+# TYPE logging_buffer_files gauge
+logging_buffer_files{entity="/buffers",host="all-to-file-fluentd-0"} 2
+# HELP logging_buffer_size_bytes Disk space used
+# TYPE logging_buffer_size_bytes gauge
+logging_buffer_size_bytes{entity="/buffers",host="all-to-file-fluentd-0"} 32253
Other improvements
- You can now configure the resources of the buffer metrics sidecar.
- You can now rerun failed configuration checks if there is no configcheck pod.
- The Fluentd ElasticSearch output now supports the composable index template format. To use it, set the
use_legacy_template
option tofalse
. - The metrics for the syslog-ng forwarder are now exported using axosyslog-metrics-exporter.
Image and dependency updates
For the list of images used in Logging operator, see Images used by Logging operator.
Fluentd images with versions v1.14
and v1.15
are now EOL due to the fact they are based on ruby 2.7 which is EOL as well.
The currently supported image is v1.15-ruby3 and build configuration for v1.15-staging is available for staging experimental changes.