-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disable access log for TCP services #2406
Comments
I'm willing to contribute this feature. How would you suggest handling configuration options for L4 services? I'm not a fan of the Could we use some sort of key/value system for tagging L4 services with? Like this:
Switching the format, while keeping backwards compatibility with the existing format should be easy. What do you say @aledbf? Do you have a plan for how to handle this in the future? |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@aledbf Hey! :) We would appreciate if you could remove the |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
Closing. The TCP and UDP features are being removed in the next release |
I don't understand... It is a feature that is being used by a lot of people, why remove it? Is there any place where we can discuss about it? |
Please check my comment #3197 (comment) |
@aledbf: Could we re-open as the TCP and UDP features removal has been reverted? I would also like to disable stream logs. I don't have any TCP or UDP services specified, but I still get some of these stream logs (not sure why it happens). They end up uncategorized in my ELK-stack. I could always just drop them in my Logstash pipeline, but I'd much rather not have them in the logs at all. |
@anton-johansson sure but someone needs to works on this :) |
@aledbf: Of course, but it's a start. :) Seems like a fairly small change, maybe suited for a first contribution? What about just adding a 2nd setting:
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
@zegl I have also experienced problems with default log format:
It is absolutely useless and "unsearchable" (in Elasticsearch, for example).
This leads to the following output:
Possible fix for default format is to add quotes into this string. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hello @zegl, |
I would be interested as well in it. Currently the log-flood for TCP health-checks makes this feature almost unusable for me, sadly. |
FYI, as a workaround I got it to a for me somewhat usable state, by effectively throwing away all TCP logmessages (to avoid the health-checks being logged). My change in HELM-chart configuration:
Regular HTTP requests are still logged, so I think this is good enough for me. 😄 |
@Excodibur this works. But that'll disable all access logging. 😫 |
For TCP access request logging, basically yes, it is disabled, The HTTP endpoints exposed over that same controller still generate access logs for me. The ideal solution in my mind would be an option we could set to filter out (empty) health-check requests from access logs. Something similar to https://cbonte.github.io/haproxy-dconv/1.7/configuration.html#4-option%20dontlognull. |
I totally agree with that. An option to just filter out health-check requests is perfect. But, your solution however still works 😄 |
On further thought, perhaps it is doable by changing nginx.cfg manually to something like:
But I really would like to stay away from altering the conf-file myself when using HELM charts. 😃 |
Is this a BUG REPORT or FEATURE REQUEST? (choose one):
Feature request.
I'm using ingress-nginx to proxy TCP services, everything is working fine, but I'd like to have the option to disable the access logs for one (or all) of the TCP backends.
Nginx is creating lots of logs like this one:
[23/Apr/2018:12:58:49 +0000]TCP200000.001
. As they are not very informative I'd like to remove them completely. That does not seem to be possible at the moment.The
enable-access-log
annotation is available for HTTP backends, but it is not available to TCP or UDP backends.NGINX Ingress controller version:
quay.io/kubernetes-ingress-controller/nginx-ingress-controller:0.12.0
The text was updated successfully, but these errors were encountered: