Use Calico Enterprise log data for visibility and troubleshooting Kubernetes clusters.
Workloads and policies are highly dynamic. To troubleshoot Kubernetes clusters, you need logs with workload identity and context. Calico Enterprise deploys an Elasticsearch cluster and Kibana instance during installation with these features:
- Logs with workload context
- Centralized log collection for multiple clusters for Calico Enterprise multi-cluster-management
- View Elasticsearch logs in Calico Enterprise Manager UI (Kibana dashboard and Flow Visualizer), and the Elasticsearch API
- Standard Kubernetes RBAC for granular access control to logs
- Collect/archive logs or subset of logs
- Log aggregation for high-volume logs
- Configure data retention settings to manage cluster disk space
- Integration with third-party tools like Amazon S3, Syslog, Splunk
Elasticsearch logs provide the visibility and troubleshooting backend for Calico Enterprise.
|Log type||Description||Log source||RBAC||Index|
|flow||Network flows for workloads: source and destination namespaces, pods, labels, and policies||Calico Enterprise cnx-node (Felix)|
|audit||Audit logs for Calico Enterprise resources||Calico Enterprise apiserver|
|Audit logs for Kubernetes resources||Kubernetes apiserver|
|Both audit logs above|
|bgp||Calico Enterprise networking BGP peering and route propagation||Calico Enterprise cnx-node (BIRD)|
|dns||DNS lookups and responses from Calico Enterprise domain-based policy||Calico Enterprise cnx-node (Felix)|
|ids||Calico Enterprise intrusion detection events: anomaly detection, suspicious IPs, suspicious domains, and global alerts||Calico Enterprise intrusion-detection-controller|
Because of their high-volume, flow and dns logs support aggregation.
Default log configuration and security
Calico Enterprise automatically installs fluentd on all nodes and collects flow, audit, and DNS logs. You can configure additional destinations like Amazon S3, Syslog, Splunk.
Calico Enterprise enables user authentication in Elasticsearch, and secures access to Elasticsearch and Kibana instances using network policy.
RBAC and log access
You control user access to logs using the standard Kubernetes RBAC cluster role and cluster role binding. For example:
- kind: User
You configure Elasticsearch log access per cluster using RBAC and the Kubernetes API group,
lma.tigera.io. For example:
resourceNames: ['flows', 'dns']
Logs for compliance reporting
Calico Enterprise compliance reports are based on archived flow logs and audit logs for these resources:
- Host endpoints
- Service accounts
- Kubernetes service endpoints
- Global network sets
- Calico Enterprise and Kubernetes network policies
- Global network policies
- Network sets
Calico Enterprise also supports archiving Cloudwatch for EKS audit logs.