solutions/legacy/logging/core-experimentation/gke-kcc-sink.yaml (50 lines of code) (raw):
# Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
######
# Project sink for the Platform and Component logs of the GKE KCC Landing Zone Cluster
# Destination: Cloud Logging bucket hosted inside logging project
apiVersion: logging.cnrm.cloud.google.com/v1beta1
kind: LoggingLogSink
metadata:
name: gke-kcc-cluster-platform-and-component-log-sink
namespace: logging
annotations:
config.kubernetes.io/depends-on: logging.cnrm.cloud.google.com/namespaces/logging/LoggingLogBucket/platform-and-component-log-bucket
spec:
projectRef:
external: management-project-12345 # kpt-set: ${management-project-id}
destination:
loggingLogBucketRef:
external: logging.googleapis.com/projects/${logging-prj-id}/locations/northamerica-northeast1/buckets/platform-and-component-log-bucket # kpt-set: logging.googleapis.com/projects/${logging-prj-id}/locations/northamerica-northeast1/buckets/platform-and-component-log-bucket
# The following setting is required
# You must set unique_writer_identity to true if you wish to publish logs across projects
uniqueWriterIdentity: true
description: Project sink for Platform and Component logs of the GKE KCC Landing Zone Cluster
# AU-2, AU-12(A), AU-12(C)
# No inclusion filter. Includes all Platform and Component logs
# Google Cloud platform logs are service-specific logs
# For a list of all supported Google Cloud Logging API Services visit https://cloud.google.com/logging/docs/api/platform-logs
# Also includes the following types of logs:
# Cloud DNS, Cloud NAT, Firewall Rules, VPC Flow, and HTTP(S) Load Balancer
# These logs are not enabled by default. They are enabled inside the client-experimentation package:
# https://github.com/GoogleCloudPlatform/pubsec-declarative-toolkit/tree/main/solutions/project/project-experimentation
# Excludes: Cloud Audit, Access Transparency, and Data Access Logs
exclusions:
- description: Exclude Security logs
disabled: false
filter: |-
LOG_ID("cloudaudit.googleapis.com/activity") OR LOG_ID("externalaudit.googleapis.com/activity")
OR LOG_ID("cloudaudit.googleapis.com/data_access") OR LOG_ID("externalaudit.googleapis.com/data_access")
OR LOG_ID("cloudaudit.googleapis.com/system_event") OR LOG_ID("externalaudit.googleapis.com/system_event")
OR LOG_ID("cloudaudit.googleapis.com/policy") OR LOG_ID("externalaudit.googleapis.com/policy")
OR LOG_ID("cloudaudit.googleapis.com/access_transparency") OR LOG_ID("externalaudit.googleapis.com/access_transparency")
name: exclude-security-logs
# excessive GKE logs are being generated by the otel-collector and krmapihosting-metrics-agent containers
# these logs will be temporarily excluded from being sinked to the platform-and-component-log bucket in the logging project in order to cut costs
- description: Exclude excesive GKE container logs (issue being investigated)
disabled: false
filter: |-
severity=ERROR
resource.type = ("k8s_container" OR "k8s_pod")
resource.labels.container_name = (
"otel-collector" OR
"krmapihosting-metrics-agent")
name: exclude-gke-logs
---
# Disable the _Default log bucket sink in the GKE KCC Cluster's management project
# This prevents duplication of logs
apiVersion: logging.cnrm.cloud.google.com/v1beta1
kind: LoggingLogSink
metadata:
name: gke-kcc-cluster-disable-default-bucket
namespace: logging
annotations:
config.kubernetes.io/depends-on: resourcemanager.cnrm.cloud.google.com/namespaces/projects/Project/${logging-prj-id} # kpt-set: resourcemanager.cnrm.cloud.google.com/namespaces/projects/Project/${logging-prj-id}
spec:
projectRef:
external: management-project-12345 # kpt-set: ${management-project-id}
destination:
# destination.loggingLogBucketRef
# Only `external` field is supported to configure the reference.
loggingLogBucketRef:
external: logging.googleapis.com/projects/${logging-prj-id}/locations/northamerica-northeast1/buckets/_Default # kpt-set: logging.googleapis.com/projects/${logging-prj-id}/locations/northamerica-northeast1/buckets/_Default
resourceID: _Default
disabled: true