Enable logging and monitoring
editEnable logging and monitoring
editThe deployment logging and monitoring feature lets you monitor your deployment in Kibana by shipping logs and metrics to a monitoring deployment. You can:
- View your deployment’s health and performance in real time and analyze past cluster, index, and node metrics.
- View your deployment’s logs to debug issues, discover slow queries, surface deprecations, and analyze access to your deployment.
Monitoring consists of two components:
- A monitoring and logging agent that is installed on each node in your deployment. The agents collect and index metrics to Elasticsearch, either on the same deployment or by sending logs and metrics to an external monitoring deployment. Elasticsearch Service manages the installation and configuration of the monitoring agent for you, and you should not modify any of the settings.
- The stack monitoring application in Kibana that visualizes the monitoring metrics through a dashboard and the logs application that allows you to search and analyze deployment logs.
The steps in this section cover only the enablement of the monitoring and logging features in Elasticsearch Service. For more information on how to use the monitoring features, refer to Monitor a cluster.
Before you begin
editSome limitations apply when you use monitoring on Elasticsearch Service. To learn more, check the monitoring restrictions and limitations.
Monitoring for production use
editFor production use, you should send your deployment logs and metrics to a dedicated monitoring deployment. Monitoring indexes logs and metrics into Elasticsearch and these indexes consume storage, memory, and CPU cycles like any other index. By using a separate monitoring deployment, you avoid affecting your other production deployments and can view the logs and metrics even when a production deployment is unavailable.
How many monitoring deployments you use depends on your requirements:
- You can ship logs and metrics for many deployments to a single monitoring deployment, if your business requirements permit it.
- Although monitoring will work with a deployment running a single node, you need a minimum of three monitoring nodes to make monitoring highly available.
-
You might need to create dedicated monitoring deployments for isolation purposes in some cases. For example:
- If you have many deployments and some of them are much larger than others, creating separate monitoring deployments prevents a large deployment from potentially affecting monitoring performance for smaller deployments.
- If you need to silo Elasticsearch data for different business departments. Deployments that have been configured to ship logs and metrics to a target monitoring deployment have access to indexing data and can manage monitoring index templates, which is addressed by creating separate monitoring deployments.
Logs and metrics that get sent to a dedicated monitoring Elasticsearch deployment may not be cleaned up automatically and might require some additional steps to remove excess data periodically.
Retention of monitoring daily indices
editStack versions 8.0 and above
editWhen you enable monitoring in Elasticsearch Service, your monitoring indices are retained
for a certain period by default. After the retention period has passed,
the monitoring indices are deleted automatically. The retention period
is configured in the .monitoring-8-ilm-policy
index lifecycle policy.
To view or edit the policy open Kibana
Stack management > Data > Index Lifecycle Policies.
Sending monitoring data to itself (self monitoring)
editWhen you enable self-monitoring in Elasticsearch Service, your monitoring indices are retained for a certain period by default. After the retention period has passed, the monitoring indices are deleted automatically. Monitoring data is retained for three days by default or as specified by the xpack.monitoring.history.duration
user setting.
To retain monitoring indices as is without deleting them automatically, you must disable the cleaner service by adding a disabled local exporter in your cluster settings.
For example
PUT /_cluster/settings { "persistent": { "xpack.monitoring.exporters.__no-default-local__": { "type": "local", "enabled": false } } }
Sending monitoring data to a dedicated monitoring deployment
editWhen monitoring for production use, where you configure your deployments to send monitoring data to a dedicated monitoring deployment for indexing, this retention period does not apply. Monitoring indices on a dedicated monitoring deployment are retained until you remove them. There are three options open to you:
- To enable the automatic deletion of monitoring indices from dedicated monitoring deployments, enable monitoring on your dedicated monitoring deployment in Elasticsearch Service to send monitoring data to itself. When an Elasticsearch deployment sends monitoring data to itself, all monitoring indices are deleted automatically after the retention period, regardless of the origin of the monitoring data.
-
Alternatively, you can enable the cleaner service on the monitoring deployment by creating a local exporter. You can define the retention period at the same time.
For example
PUT _cluster/settings { "persistent": { "xpack" : { "monitoring" : { "exporters" : { "found-user-defined" : { "type" : "local", "enabled" : "true" } }, "history" : { "duration" : "24h" } } } } }
- To retain monitoring indices on a dedicated monitoring deployment as is without deleting them automatically, no additional steps are required other than making sure that you do not enable the monitoring deployment to send monitoring data to itself. You should also monitor the deployment for disk space usage and upgrade your deployment periodically, if necessary.
Retention of logging indices
editAn ILM policy is pre-configured to manage log retention. The policy can be adjusted according to your requirements.
Index management
editWhen sending monitoring data to a deployment, you can configure Index Lifecycle Management (ILM) to manage retention of your monitoring and logging indices. When sending logs to a deployment, an ILM policy is pre-configured to manage log retention and the policy can be customized to your needs.
Enable logging and monitoring
editElasticsearch Service manages the installation and configuration of the monitoring agent for you. When you enable monitoring on a deployment, you are configuring where the monitoring agent for your current deployment should send its logs and metrics.
To enable monitoring on your deployment:
- Log in to the Elasticsearch Service Console.
-
Find your deployment on the home page in the Elasticsearch Service card and select Manage to access it directly. Or, select Hosted deployments to go to the deployments page to view all of your deployments.
On the deployments page you can narrow your deployments by name, ID, or choose from several other filters. To customize your view, use a combination of filters, or change the format from a grid to a list.
- From your deployment menu, go to the Logs and metrics page.
- Select Enable.
-
Choose where to send your logs and metrics. Select Save.
If a deployment is not listed, make sure that it is running a compatible version. The monitoring deployment and production deployment must be on the same major version, cloud provider, and region.
Remember to send logs and metrics for production deployments to a dedicated monitoring deployment, so that your production deployments are not impacted by the overhead of indexing and storing monitoring data. A dedicated monitoring deployment also gives you more control over the retention period for monitoring data.
Enabling logs and monitoring may trigger a plan change on your deployment. You can monitor the plan change progress from the deployment’s Activity page.
Enabling logs and monitoring requires some extra resource on a deployment. For production systems, we recommend sizing deployments with logs and monitoring enabled to at least 4 GB of RAM.
Access the monitoring application in Kibana
editWith monitoring enabled for your deployment, you can access the logs and stack monitoring through Kibana.
- Log in to the Elasticsearch Service Console.
-
Find your deployment on the home page in the Elasticsearch Service card and select Manage to access it directly. Or, select Hosted deployments to go to the deployments page to view all of your deployments.
On the deployments page you can narrow your deployments by name, ID, or choose from several other filters. To customize your view, use a combination of filters, or change the format from a grid to a list.
- From your deployment menu, go to the Logs and Metrics page.
- Select the corresponding View button to check the logs or metrics data.
Alternatively, you can access logs and metrics directly on the Kibana Logs and Stack Monitoring pages in the target monitoring deployment. You can also create an elastic-cloud-logs-*
data view (formerly index pattern) to view your deployment’s logs in the Kibana Discover tab. Several fields are available for you to view logs based on key details, such as the source deployment:
Field | Description | Example value |
---|---|---|
|
The ID of the deployment that generated the log |
|
|
The name of the deployment that generated the log |
|
|
The availability zone in which the instance that generated the log is deployed |
|
|
The ID of the instance that generated the log |
|
|
The type of instance that generated the log |
|
|
The version of the stack resource that generated the log |
|
Logging features
editWhen shipping logs to a monitoring deployment there are more logging features available to you. These features include:
For Elasticsearch:
edit- Audit logging - logs security-related events on your deployment
- Slow query and index logging - helps find and debug slow queries and indexing
- Verbose logging - helps debug stack issues by increasing component logs
After you’ve enabled log delivery on your deployment, you can add the Elasticsearch user settings to enable these features.
For Kibana:
edit- Audit logging - logs security-related events on your deployment
After you’ve enabled log delivery on your deployment, you can add the Kibana user settings to enable this feature.
Other components
editEnabling log collection also supports collecting and indexing the following types of logs from other components in your deployments:
Enterprise Search
- connectors.log*
- crawler.log*
- filebeat*
- app-server.log*
- system.log*
- worker.log*
- kibana.log*
App Search
- app-search*.log
APM
- apm*.log*
Fleet and Elastic Agent
- fleet-server-json.log-*
- elastic-agent-json.log-*
The ˆ*ˆ indicates that we also index the archived files of each type of log.
Check the respective product documentation for more information about the logging capabilities of each product.
Metrics features
editWith logging and monitoring enabled for a deployment, metrics are collected for Elasticsearch, Kibana, Enterprise Search, and APM with Fleet Server.
Enabling Elasticsearch/Kibana audit logs on your deployment
editAudit logs are useful for tracking security events on your Elasticsearch and/or Kibana clusters. To enable Elasticsearch audit logs on your deployment:
- Log in to the Elasticsearch Service Console.
-
Find your deployment on the home page in the Elasticsearch Service card and select Manage to access it directly. Or, select Hosted deployments to go to the deployments page to view all of your deployments.
On the deployments page you can narrow your deployments by name, ID, or choose from several other filters. To customize your view, use a combination of filters, or change the format from a grid to a list.
- From your deployment menu, go to the Edit page.
- To enable audit logs in Elasticsearch, in the Elasticsearch section select Manage user settings and extensions. For deployments with existing user settings, you may have to expand the Edit elasticsearch.yml caret for each node instead.
- To enable audit logs in Kibana, in the Kibana section select Edit user settings. For deployments with existing user settings, you may have to expand the Edit kibana.yml caret instead.
-
Add
xpack.security.audit.enabled: true
to the user settings. - Select Save changes.
A plan change will run on your deployment. When it finishes, audit logs will be delivered to your monitoring deployment.
Restrictions and limitations
edit- To avoid compatibility issues, ensure your monitoring cluster and production cluster run on the same Elastic Stack version. Monitoring clusters that use 8.x do work with production clusters that use the latest release of 7.x, but this setup should only occur when upgrading clusters to the same version.
- Monitoring across regions is not supported. If you need to move your existing monitoring to the same region, you can do a reindex or create a new deployment and select the snapshot from the old deployment.
- The logs shipped to a monitoring cluster use an ILM managed data stream (elastic-cloud-logs-<version>). If you need to delete indices due to space, do not delete the current is_write_enabled: true index.
- When sending metrics to a dedicated monitoring deployment, the graph for IO Operations Rate(/s) is blank. This is due to the fact that this graph actually contains metrics from of all of the virtualized resources from the provider.