Getting Envoy's Access Logs
The simplest kind of Istio logging is
Envoy’s access logging1.
Envoy proxies print access information to their standard output.
The standard output of Envoy’s containers can then be printed by the kubectl logs
command.
Before you begin
Setup Istio by following the instructions in the Installation guide2.
Deploy the sleep3 sample app to use as a test source for sending requests. If you have automatic sidecar injection enabled, run the following command to deploy the sample app:
Otherwise, manually inject the sidecar before deploying the
sleep
application with the following command:Set the
SOURCE_POD
environment variable to the name of your source pod:
Start the httpbin5 sample.
If you have enabled automatic sidecar injection, deploy the
httpbin
service:Otherwise, you have to manually inject the sidecar before deploying the
httpbin
application:
Enable Envoy’s access logging
Edit the istio
configuration map:
You can also choose between JSON and text by setting accessLogEncoding
to JSON
or TEXT
.
You may also want to customize the
format7 of the access log by editing accessLogFormat
.
global.proxy.accessLogFile
global.proxy.accessLogEncoding
global.proxy.accessLogFormat
Test the access log
Send a request from
sleep
tohttpbin
:Check
sleep
’s log:Check
httpbin
’s log:
Note that the messages corresponding to the request appear in logs of the Istio proxies of both the source and the destination, sleep
and httpbin
, respectively. You can see in the log the HTTP verb (GET
), the HTTP path (/status/418
), the response code (418
) and other request-related information7.
Cleanup
Shutdown the sleep3 and httpbin5 services:
Disable Envoy’s access logging
Edit the istio
configuration map and set accessLogFile
to ""
.