Logging

Logging is helpful because it allows you to:

  • Capture and analyze the state of your cluster
  • Look for trends in your environment
  • Save your logs to a safe location outside of your cluster
  • Stay informed of events like a container crashing, a pod eviction, or a node dying

Rancher can integrate with Elasticsearch, splunk, kafka, syslog, and fluentd.

Logging was improved in Rancher v2.5.

  • If you are using Rancher v2.5, refer to the logging documentation here.
  • If you are using Rancher v2.0.x-v2.4.x, refer to the logging documentation

Monitoring and Alerts

Using Rancher, you can monitor the state and processes of your cluster nodes, Kubernetes components, and software deployments through integration with , a leading open-source monitoring solution.

Notifiers are services that inform you of alert events. You can configure notifiers to send alert notifications to staff best suited to take corrective action. Notifications can be sent with Slack, email, PagerDuty, WeChat, and webhooks.

Alerts are rules that trigger those notifications. Before you can receive alerts, you must configure one or more notifier in Rancher. The scope for alerts can be set at either the cluster or project level.

  • If you are using Rancher v2.5, refer to the monitoring documentation here.
  • If you are using Rancher v2.0.x-v2.4.x, refer to the monitoring documentation

Istio

Available as of v2.3

is an open-source tool that makes it easier for DevOps teams to observe, control, troubleshoot, and secure the traffic within a complex network of microservices.

  • If you are using Rancher v2.5, refer to the Istio documentation here.
  • If you are using Rancher v2.3.x-v2.4.x, refer to the Istio documentation

OPA Gatekeeper

is an open-source project that provides integration between OPA and Kubernetes to provide policy control via admission controller webhooks. For details on how to enable Gatekeeper in Rancher, refer to the OPA Gatekeeper section.

CIS Scans

Rancher can run a security scan to check whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark.

If you are using Rancher v2.5, refer to the CIS scan documentation here.

If you are using Rancher v2.4, refer to the CIS scan documentation