CloudWatch logging
This topic explains how to configure Amazon CloudWatch logging for your EKS cluster’s control plane components. CloudWatch logging provides visibility into your cluster’s control plane operations, which is essential for troubleshooting issues, auditing cluster activities, and monitoring the health of your Kubernetes components.
Enabling CloudWatch logging
CloudWatch logging for EKS control plane is not enabled by default due to data ingestion and storage costs.
To enable control plane logging when cluster is created, you will need to define
cloudWatch.clusterLogging.enableTypes
setting in your ClusterConfig
(see below for examples).
So if you have a config file with correct
cloudWatch.clusterLogging.enableTypes
setting, you can create a cluster with eksctl create cluster --config-file=<path>
.
If you have created a cluster already, you can use eksctl utils update-cluster-logging
.
Note
this command runs in plan mode by default, you will need to specify --approve
flag to
apply the changes to your cluster.
If you are using a config file, run:
eksctl utils update-cluster-logging --config-file=<path>
Alternatively, you can use CLI flags.
To enable all types of logs, run:
eksctl utils update-cluster-logging --enable-types all
To enable audit
logs, run:
eksctl utils update-cluster-logging --enable-types audit
To enable all but controllerManager
logs, run:
eksctl utils update-cluster-logging --enable-types=all --disable-types=controllerManager
If the api
and scheduler
log types were already enabled, to disable scheduler
and enable controllerManager
at
the same time, run:
eksctl utils update-cluster-logging --enable-types=controllerManager --disable-types=scheduler
This will leave api
and controllerManager
as the only log types enabled.
To disable all types of logs, run:
eksctl utils update-cluster-logging --disable-types all
ClusterConfig
Examples
In an EKS cluster, the enableTypes
field under clusterLogging
can take a list of possible values to enable the different types of logs for the control plane components.
The following are the possible values:
-
api
: Enables the Kubernetes API server logs. -
audit
: Enables the Kubernetes audit logs. -
authenticator
: Enables the authenticator logs. -
controllerManager
: Enables the Kubernetes controller manager logs. -
scheduler
: Enables the Kubernetes scheduler logs.
To learn more, see EKS documentation.
Disable all logs
To disable all types, use []
or remove the cloudWatch
section completely.
Enable all logs
You can enable all types with "*"
or "all"
. For example:
cloudWatch: clusterLogging: enableTypes: ["*"]
Enable one or more logs
You can enable a subset of types by listing the types you want to enable. For example:
cloudWatch: clusterLogging: enableTypes: - "audit" - "authenticator"
Log retention period
By default, logs are stored in CloudWatch Logs, indefinitely. You can specify the number of days for which the control plane logs should be retained in CloudWatch Logs. The following example retains logs for 7 days:
cloudWatch: clusterLogging: logRetentionInDays: 7
Complete example
apiVersion: eksctl.io/v1alpha5 kind: ClusterConfig metadata: name: cluster-11 region: eu-west-2 nodeGroups: - name: ng-1 instanceType: m5.large desiredCapacity: 1 cloudWatch: clusterLogging: enableTypes: ["audit", "authenticator"] logRetentionInDays: 7