Logs¶
Reading What's Happening
By default, logs are written to stdout, in text format.
Configuration¶
General¶
Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on).
filePath
¶
By default, the logs are written to the standard output.
You can configure a file path instead using the filePath
option.
# Writing Logs to a File
log:
filePath: "/path/to/traefik.log"
# Writing Logs to a File
[log]
filePath = "/path/to/traefik.log"
# Writing Logs to a File
--log.filePath=/path/to/traefik.log
format
¶
By default, the logs use a text format (common
), but you can also ask for the json
format in the format
option.
# Writing Logs to a File, in JSON
log:
filePath: "/path/to/log-file.log"
format: json
# Writing Logs to a File, in JSON
[log]
filePath = "/path/to/log-file.log"
format = "json"
# Writing Logs to a File, in JSON
--log.filePath=/path/to/traefik.log
--log.format=json
level
¶
By default, the level
is set to ERROR
.
Alternative logging levels are TRACE
, DEBUG
, INFO
, WARN
, ERROR
, FATAL
, and PANIC
.
log:
level: DEBUG
[log]
level = "DEBUG"
--log.level=DEBUG
noColor
¶
When using the 'common' format, disables the colorized output.
log:
noColor: true
[log]
noColor = true
--log.nocolor=true
Log Rotation¶
The rotation of the log files can be configured with the following options.
maxSize
¶
maxSize
is the maximum size in megabytes of the log file before it gets rotated.
It defaults to 100 megabytes.
log:
maxSize: 1
[log]
maxSize = 1
--log.maxsize=1
maxBackups
¶
maxBackups
is the maximum number of old log files to retain.
The default is to retain all old log files (though maxAge
may still cause them to get deleted).
log:
maxBackups: 3
[log]
maxBackups = 3
--log.maxbackups=3
maxAge
¶
maxAge
is the maximum number of days to retain old log files based on the timestamp encoded in their filename.
Note that a day is defined as 24 hours and may not exactly correspond to calendar days due to daylight savings, leap seconds, etc.
The default is not to remove old log files based on age.
log:
maxAge: 3
[log]
maxAge = 3
--log.maxage=3
compress
¶
compress
determines if the rotated log files should be compressed using gzip.
The default is not to perform compression.
log:
compress: true
[log]
compress = true
--log.compress=true
OpenTelemetry¶
Experimental Feature
The OpenTelemetry logs feature is currently experimental and must be explicitly enabled in the experimental section prior to use.
experimental:
otlpLogs: true
[experimental.otlpLogs]
--experimental.otlpLogs=true
To enable the OpenTelemetry Logger for logs:
log:
otlp: {}
[log.otlp]
--log.otlp=true
Default protocol
The OpenTelemetry Logger exporter will export logs to the collector using HTTPS by default to https://localhost:4318/v1/logs, see the gRPC Section to use gRPC.
HTTP configuration¶
Optional
This instructs the exporter to send logs to the OpenTelemetry Collector using HTTP.
log:
otlp:
http: {}
[log.otlp.http]
--log.otlp.http=true
endpoint
¶
Optional, Default="https://localhost:4318/v1/logs
", Format="<scheme>://<host>:<port><path>
"
URL of the OpenTelemetry Collector to send logs to.
Insecure mode
To disable TLS, use http://
instead of https://
in the endpoint
configuration.
log:
otlp:
http:
endpoint: https://collector:4318/v1/logs
[log.otlp.http]
endpoint = "https://collector:4318/v1/logs"
--log.otlp.http.endpoint=https://collector:4318/v1/logs
headers
¶
Optional, Default={}
Additional headers sent with logs by the exporter to the OpenTelemetry Collector.
log:
otlp:
http:
headers:
foo: bar
baz: buz
[log.otlp.http.headers]
foo = "bar"
baz = "buz"
--log.otlp.http.headers.foo=bar --log.otlp.http.headers.baz=buz
tls
¶
Optional
Defines the Client TLS configuration used by the exporter to send logs to the OpenTelemetry Collector.
ca
¶
Optional
ca
is the path to the certificate authority used for the secure connection to the OpenTelemetry Collector,
it defaults to the system bundle.
log:
otlp:
http:
tls:
ca: path/to/ca.crt
[log.otlp.http.tls]
ca = "path/to/ca.crt"
--log.otlp.http.tls.ca=path/to/ca.crt
cert
¶
Optional
cert
is the path to the public certificate used for the secure connection to the OpenTelemetry Collector.
When using this option, setting the key
option is required.
log:
otlp:
http:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
[log.otlp.http.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
--log.otlp.http.tls.cert=path/to/foo.cert
--log.otlp.http.tls.key=path/to/foo.key
key
¶
Optional
key
is the path to the private key used for the secure connection to the OpenTelemetry Collector.
When using this option, setting the cert
option is required.
log:
otlp:
http:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
[log.otlp.http.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
--log.otlp.http.tls.cert=path/to/foo.cert
--log.otlp.http.tls.key=path/to/foo.key
insecureSkipVerify
¶
Optional, Default=false
If insecureSkipVerify
is true
,
the TLS connection to the OpenTelemetry Collector accepts any certificate presented by the server regardless of the hostnames it covers.
log:
otlp:
http:
tls:
insecureSkipVerify: true
[log.otlp.http.tls]
insecureSkipVerify = true
--log.otlp.http.tls.insecureSkipVerify=true
gRPC configuration¶
Optional
This instructs the exporter to send logs to the OpenTelemetry Collector using gRPC.
log:
otlp:
grpc: {}
[log.otlp.grpc]
--log.otlp.grpc=true
endpoint
¶
Required, Default="localhost:4317", Format="<host>:<port>
"
Address of the OpenTelemetry Collector to send logs to.
log:
otlp:
grpc:
endpoint: localhost:4317
[log.otlp.grpc]
endpoint = "localhost:4317"
--log.otlp.grpc.endpoint=localhost:4317
insecure
¶
Optional, Default=false
Allows exporter to send logs to the OpenTelemetry Collector without using a secured protocol.
log:
otlp:
grpc:
insecure: true
[log.otlp.grpc]
insecure = true
--log.otlp.grpc.insecure=true
headers
¶
Optional, Default={}
Additional headers sent with logs by the exporter to the OpenTelemetry Collector.
log:
otlp:
grpc:
headers:
foo: bar
baz: buz
[log.otlp.grpc.headers]
foo = "bar"
baz = "buz"
--log.otlp.grpc.headers.foo=bar --log.otlp.grpc.headers.baz=buz
tls
¶
Optional
Defines the Client TLS configuration used by the exporter to send logs to the OpenTelemetry Collector.
ca
¶
Optional
ca
is the path to the certificate authority used for the secure connection to the OpenTelemetry Collector,
it defaults to the system bundle.
log:
otlp:
grpc:
tls:
ca: path/to/ca.crt
[log.otlp.grpc.tls]
ca = "path/to/ca.crt"
--log.otlp.grpc.tls.ca=path/to/ca.crt
cert
¶
Optional
cert
is the path to the public certificate used for the secure connection to the OpenTelemetry Collector.
When using this option, setting the key
option is required.
log:
otlp:
grpc:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
[log.otlp.grpc.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
--log.otlp.grpc.tls.cert=path/to/foo.cert
--log.otlp.grpc.tls.key=path/to/foo.key
key
¶
Optional
key
is the path to the private key used for the secure connection to the OpenTelemetry Collector.
When using this option, setting the cert
option is required.
log:
otlp:
grpc:
tls:
cert: path/to/foo.cert
key: path/to/foo.key
[log.otlp.grpc.tls]
cert = "path/to/foo.cert"
key = "path/to/foo.key"
--log.otlp.grpc.tls.cert=path/to/foo.cert
--log.otlp.grpc.tls.key=path/to/foo.key
insecureSkipVerify
¶
Optional, Default=false
If insecureSkipVerify
is true
,
the TLS connection to the OpenTelemetry Collector accepts any certificate presented by the server regardless of the hostnames it covers.
log:
otlp:
grpc:
tls:
insecureSkipVerify: true
[log.otlp.grpc.tls]
insecureSkipVerify = true
--log.otlp.grpc.tls.insecureSkipVerify=true
Using Traefik OSS in Production?
If you are using Traefik at work, consider adding enterprise-grade API gateway capabilities or commercial support for Traefik OSS.
Adding API Gateway capabilities to Traefik OSS is fast and seamless. There's no rip and replace and all configurations remain intact. See it in action via this short video.