Skip to content

Logs

Reading What's Happening

By default, logs are written to stdout, in text format.

Configuration

General

Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on).

filePath

By default, the logs are written to the standard output. You can configure a file path instead using the filePath option.

# Writing Logs to a File
log:
  filePath: "/path/to/traefik.log"
# Writing Logs to a File
[log]
  filePath = "/path/to/traefik.log"
# Writing Logs to a File
--log.filePath=/path/to/traefik.log

format

By default, the logs use a text format (common), but you can also ask for the json format in the format option.

# Writing Logs to a File, in JSON
log:
  filePath: "/path/to/log-file.log"
  format: json
# Writing Logs to a File, in JSON
[log]
  filePath = "/path/to/log-file.log"
  format = "json"
# Writing Logs to a File, in JSON
--log.filePath=/path/to/traefik.log
--log.format=json

level

By default, the level is set to ERROR.

Alternative logging levels are TRACE, DEBUG, INFO, WARN, ERROR, FATAL, and PANIC.

log:
  level: DEBUG
[log]
  level = "DEBUG"
--log.level=DEBUG

noColor

When using the 'common' format, disables the colorized output.

log:
  noColor: true
[log]
  noColor = true
--log.nocolor=true

Log Rotation

The rotation of the log files can be configured with the following options.

maxSize

maxSize is the maximum size in megabytes of the log file before it gets rotated. It defaults to 100 megabytes.

log:
  maxSize: 1
[log]
  maxSize = 1
--log.maxsize=1

maxBackups

maxBackups is the maximum number of old log files to retain. The default is to retain all old log files (though maxAge may still cause them to get deleted).

log:
  maxBackups: 3
[log]
  maxBackups = 3
--log.maxbackups=3

maxAge

maxAge is the maximum number of days to retain old log files based on the timestamp encoded in their filename. Note that a day is defined as 24 hours and may not exactly correspond to calendar days due to daylight savings, leap seconds, etc. The default is not to remove old log files based on age.

log:
  maxAge: 3
[log]
  maxAge = 3
--log.maxage=3

compress

compress determines if the rotated log files should be compressed using gzip. The default is not to perform compression.

log:
  compress: true
[log]
  compress = true
--log.compress=true

OpenTelemetry

Experimental Feature

The OpenTelemetry logs feature is currently experimental and must be explicitly enabled in the experimental section prior to use.

experimental:
  otlpLogs: true
[experimental.otlpLogs]
--experimental.otlpLogs=true

To enable the OpenTelemetry Logger for logs:

log:
  otlp: {}
[log.otlp]
--log.otlp=true

Default protocol

The OpenTelemetry Logger exporter will export logs to the collector using HTTPS by default to https://localhost:4318/v1/logs, see the gRPC Section to use gRPC.

HTTP configuration

Optional

This instructs the exporter to send logs to the OpenTelemetry Collector using HTTP.

log:
  otlp:
    http: {}
[log.otlp.http]
--log.otlp.http=true

endpoint

Optional, Default="https://localhost:4318/v1/logs", Format="<scheme>://<host>:<port><path>"

URL of the OpenTelemetry Collector to send logs to.

Insecure mode

To disable TLS, use http:// instead of https:// in the endpoint configuration.

log:
  otlp:
    http:
      endpoint: https://collector:4318/v1/logs
[log.otlp.http]
  endpoint = "https://collector:4318/v1/logs"
--log.otlp.http.endpoint=https://collector:4318/v1/logs

headers

Optional, Default={}

Additional headers sent with logs by the exporter to the OpenTelemetry Collector.

log:
  otlp:
    http:
      headers:
        foo: bar
        baz: buz
[log.otlp.http.headers]
  foo = "bar"
  baz = "buz"
--log.otlp.http.headers.foo=bar --log.otlp.http.headers.baz=buz

tls

Optional

Defines the Client TLS configuration used by the exporter to send logs to the OpenTelemetry Collector.

ca

Optional

ca is the path to the certificate authority used for the secure connection to the OpenTelemetry Collector, it defaults to the system bundle.

log:
  otlp:
    http:
      tls:
        ca: path/to/ca.crt
[log.otlp.http.tls]
  ca = "path/to/ca.crt"
--log.otlp.http.tls.ca=path/to/ca.crt
cert

Optional

cert is the path to the public certificate used for the secure connection to the OpenTelemetry Collector. When using this option, setting the key option is required.

log:
  otlp:
    http:
      tls:
        cert: path/to/foo.cert
        key: path/to/foo.key
[log.otlp.http.tls]
  cert = "path/to/foo.cert"
  key = "path/to/foo.key"
--log.otlp.http.tls.cert=path/to/foo.cert
--log.otlp.http.tls.key=path/to/foo.key
key

Optional

key is the path to the private key used for the secure connection to the OpenTelemetry Collector. When using this option, setting the cert option is required.

log:
  otlp:
    http:
      tls:
        cert: path/to/foo.cert
        key: path/to/foo.key
[log.otlp.http.tls]
  cert = "path/to/foo.cert"
  key = "path/to/foo.key"
--log.otlp.http.tls.cert=path/to/foo.cert
--log.otlp.http.tls.key=path/to/foo.key
insecureSkipVerify

Optional, Default=false

If insecureSkipVerify is true, the TLS connection to the OpenTelemetry Collector accepts any certificate presented by the server regardless of the hostnames it covers.

log:
  otlp:
    http:
      tls:
        insecureSkipVerify: true
[log.otlp.http.tls]
  insecureSkipVerify = true
--log.otlp.http.tls.insecureSkipVerify=true

gRPC configuration

Optional

This instructs the exporter to send logs to the OpenTelemetry Collector using gRPC.

log:
  otlp:
    grpc: {}
[log.otlp.grpc]
--log.otlp.grpc=true

endpoint

Required, Default="localhost:4317", Format="<host>:<port>"

Address of the OpenTelemetry Collector to send logs to.

log:
  otlp:
    grpc:
      endpoint: localhost:4317
[log.otlp.grpc]
  endpoint = "localhost:4317"
--log.otlp.grpc.endpoint=localhost:4317

insecure

Optional, Default=false

Allows exporter to send logs to the OpenTelemetry Collector without using a secured protocol.

log:
  otlp:
    grpc:
      insecure: true
[log.otlp.grpc]
  insecure = true
--log.otlp.grpc.insecure=true

headers

Optional, Default={}

Additional headers sent with logs by the exporter to the OpenTelemetry Collector.

log:
  otlp:
    grpc:
      headers:
        foo: bar
        baz: buz
[log.otlp.grpc.headers]
  foo = "bar"
  baz = "buz"
--log.otlp.grpc.headers.foo=bar --log.otlp.grpc.headers.baz=buz

tls

Optional

Defines the Client TLS configuration used by the exporter to send logs to the OpenTelemetry Collector.

ca

Optional

ca is the path to the certificate authority used for the secure connection to the OpenTelemetry Collector, it defaults to the system bundle.

log:
  otlp:
    grpc:
      tls:
        ca: path/to/ca.crt
[log.otlp.grpc.tls]
  ca = "path/to/ca.crt"
--log.otlp.grpc.tls.ca=path/to/ca.crt
cert

Optional

cert is the path to the public certificate used for the secure connection to the OpenTelemetry Collector. When using this option, setting the key option is required.

log:
  otlp:
    grpc:
      tls:
        cert: path/to/foo.cert
        key: path/to/foo.key
[log.otlp.grpc.tls]
  cert = "path/to/foo.cert"
  key = "path/to/foo.key"
--log.otlp.grpc.tls.cert=path/to/foo.cert
--log.otlp.grpc.tls.key=path/to/foo.key
key

Optional

key is the path to the private key used for the secure connection to the OpenTelemetry Collector. When using this option, setting the cert option is required.

log:
  otlp:
    grpc:
      tls:
        cert: path/to/foo.cert
        key: path/to/foo.key
[log.otlp.grpc.tls]
  cert = "path/to/foo.cert"
  key = "path/to/foo.key"
--log.otlp.grpc.tls.cert=path/to/foo.cert
--log.otlp.grpc.tls.key=path/to/foo.key
insecureSkipVerify

Optional, Default=false

If insecureSkipVerify is true, the TLS connection to the OpenTelemetry Collector accepts any certificate presented by the server regardless of the hostnames it covers.

log:
  otlp:
    grpc:
      tls:
        insecureSkipVerify: true
[log.otlp.grpc.tls]
  insecureSkipVerify = true
--log.otlp.grpc.tls.insecureSkipVerify=true

Using Traefik OSS in Production?

If you are using Traefik at work, consider adding enterprise-grade API gateway capabilities or commercial support for Traefik OSS.

Adding API Gateway capabilities to Traefik OSS is fast and seamless. There's no rip and replace and all configurations remain intact. See it in action via this short video.