Istio access logs
Collect and review access logs to monitor the traffic to your Istio-enabled workloads.
About
Leverage the default Envoy access log collector to record logs for the Istio ingress gateway and Istio-enabled workloads in your service mesh. You can then review these logs to troubleshoot issues as-needed, or scrape these logs to view them in your larger platform logging system. The full record of each request includes source and destination metadata, such as the client ID that initiated the request. Auditors in your organization can use this information to detect malicious activity or unusual amounts of requests to your gateway.
To get started, enable the default Envoy access log collector in your Istio installation.
Enable access logging
Enable the default Envoy access log collector when you install or update Istio.
Allow your Istio-enabled workloads to produce access logs by updating your Istio installation.
Restart the workloads that you want to collect access logs for. For example, to restart the Bookinfo product page app, run the following command.
kubectl rollout restart deployment productpage-v1 -n bookinfo --context $REMOTE_CONTEXT
View access logs
View the Envoy access logs that are recorded by default for workloads in your service mesh.
The following example steps assume that you installed the Bookinfo app in your cluster. You can follow the Get started guide to install Bookinfo. However, you can edit these example steps for your own apps as well.
Create a temporary container with the
curl
utility in the same namespace as theratings
Bookinfo service.kubectl run -it --context $REMOTE_CONTEXT1 -n bookinfo curl \ --image=curlimages/curl:7.73.0 --rm -- sh
From the new terminal, generate access logs by sending requests to
ratings
. Typeexit
when you’re done.curl http://ratings:9080/ratings/1 -v
View the
ratings
access logs.kubectl logs -l app=ratings -c istio-proxy --context $REMOTE_CONTEXT1 -n bookinfo
Check the logs for the
ratings
app. All access logs for the requests that you previously sent are recorded. For example, the logs might look similar to the following:[2022-06-17T00:29:40.135Z] "GET /ratings/1 HTTP/1.1" 200 - via_upstream - "-" 0 48 2 1 "-" "curl/7.73.0-DEV" "8bdf59f8-0608-4d39-ac73-268519068afb" "ratings:9080" "10.24.1.17:9080" inbound|9080|| 127.0.0.6:59801 10.24.1.17:9080 10.24.0.21:48722 outbound_.9080_._.ratings.bookinfo.svc.cluster.local default [2022-06-17T00:30:08.114Z] "GET /ratings/1 HTTP/1.1" 200 - via_upstream - "-" 0 48 2 2 "-" "curl/7.73.0-DEV" "248926bd-ca16-42a6-866d-d2ab5a1440ee" "ratings:9080" "10.24.1.17:9080" inbound|9080|| 127.0.0.6:47333 10.24.1.17:9080 10.24.0.21:48672 outbound_.9080_._.ratings.bookinfo.svc.cluster.local default