Skip to content

Husbanken/openshift-logforwarding-splunk

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OpenShift Log Forwarding to Splunk

This repository contains assets to forward container logs from an OpenShift Container Platform 4.3+ to Splunk.

Overview

OpenShift contains a container log aggregation feature built on the ElasticSearch, Fluentd and Kibana (EFK) stack. Support is available (Tech Preview as of 4.3/4.4) to send logs generated on the platform to external targets using the Fluentd forwarder feature with output in Splunk using the HTTP Event Collector (HEC).

The assets contained in this repository support demonstrating this functionality by establishing a non persistent deployment of Splunk to OpenShift in a namespace called splunk and sending application container logs to an index in Splunk called openshift.

Prerequisites

The following prerequisites must be satisfied prior to deploying this integration

  • OpenShift Container Platform 4.3 with Administrative access
  • Base Cluster logging installed
  • Tools

Components

The primary assets contained within this repository is a Helm Chart to deploy LogForwarding. Please refer to the values.yaml file for the customizing the installation.

SSL Communication

Fluentd

By default, SSL communication between the platform deployed Fluentd instances and the LogForwarding instance is enabled by default. It can be disabled by setting the forwarding.fluentd.ssl=false value. A default certificate and private key is available for use by default (CN=openshift-logforwarding-splunk.openshift-logging.svc). Otherwise, certificates can be provided by setting the forwarding.fluentd.caFile and forwarding.fluentd.keyFile to a path relative to the chart.

Splunk

Communication between the Fluentd Forwarder and Splunk can be exchanged using certificates. The certificate file can be referenced by setting the forwarding.splunk.caFile value.

By default, certificate verification is disabled between the two components. It can be enabled by specifying forwarding.splunk.insecure=false

Splunk HEC Token

A HEC token is used to communicate between the Fluentd forwarder and Splunk. It is required and can be provided in the forwarding.splunk.token value.

Installation and Deployment

With all of the prerequisites met and an overview of the components provided in this repository, execute the following commands to deploy the solution:

  1. Login to OpenShift with a user with cluster-admin permissions
  2. Deploy Splunk
$ ./splunk-install.sh
  1. Deploy the log forwarding Helm chart by providing the value of the HEC token along with any additional values
$ helm upgrade -i --namespace=openshift-logging openshift-logforwarding-splunk charts/openshift-logforwarding-splunk/ --set forwarding.splunk.token=<token>
  1. Annotate the ClusterLogging instance

OpenShift environments (version <4.6) with the Tech Preview (TP) of the Log Forwarding API required the ClusterLogging instance be annotated as follows.

$ oc annotate clusterlogging -n openshift-logging instance clusterlogging.openshift.io/logforwardingtechpreview=enabled
  1. Verify that you can view logs in Splunk

    1. Login to Splunk by first accessing the Splunk route
    $ echo "https://$(oc get routes -n splunk splunk -o jsonpath='{.spec.host}')"
    
    1. Search for OpenShift logs in the openshift namespace

    Search Query: index=openshift

About

Demonstration of forwarding logs from OpenShift to Splunk

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Mustache 55.2%
  • Shell 44.8%