v0.12-debian-elasticsearch
docker-image/v0.12/debian-elasticsearch/Dockerfilev0.12-debian-loggly
docker-image/v0.12/debian-loggly/Dockerfilev0.12-debian-logentries
docker-image/v0.12/debian-logentries/Dockerfilev0.12-debian-cloudwatch
docker-image/v0.12/debian-cloudwatch/Dockerfilev0.12-debian-stackdriver
docker-image/v0.12/debian-stackdriver/Dockerfilev0.12-debian-s3
docker-image/v0.12/debian-s3/Dockerfilev0.12-debian-gcs
docker-image/v0.12/debian-gcs/Dockerfilev0.12-debian-papertrail
docker-image/v0.12/debian-papertrail/Dockerfilev0.12-debian-syslog
docker-image/v0.12/debian-syslog/Dockerfilev0.12-debian-graylog
docker-image/v0.12/debian-graylog/Dockerfilev0.12-debian-logzio
docker-image/v0.12/debian-logzio/Dockerfilev0.12-debian-kafka
docker-image/v0.12/debian-kafka/Dockerfilev0.12-debian-splunkhec
docker-image/v0.12/debian-splunkhec/Dockerfilev0.12-debian-kinesis
docker-image/v0.12/debian-kinesis/Dockerfilev1.2-debian-elasticsearch
docker-image/v1.2/debian-elasticsearch/Dockerfilev1.2-debian-loggly
docker-image/v1.2/debian-loggly/Dockerfilev1.2-debian-logentries
docker-image/v1.2/debian-logentries/Dockerfilev1.2-debian-cloudwatch
docker-image/v1.2/debian-cloudwatch/Dockerfilev1.2-debian-stackdriver
docker-image/v1.2/debian-stackdriver/Dockerfilev1.2-debian-s3
docker-image/v1.2/debian-s3/Dockerfilev1.2-debian-syslog
docker-image/v1.2/debian-syslog/Dockerfilev1.2-debian-gcs
docker-image/v1.2/debian-gcs/Dockerfilev1.2-debian-graylog
docker-image/v1.2/debian-graylog/Dockerfilev1.2-debian-papertrail
docker-image/v1.2/debian-papertrail/Dockerfilev1.2-debian-logzio
docker-image/v1.2/debian-logzio/Dockerfilev1.2-debian-kafka
docker-image/v1.2/debian-kafka/Dockerfilev1.2-debian-kinesis
docker-image/v1.2/debian-kinesis/Dockerfile
v0.12-alpine-elasticsearch
docker-image/v0.12/alpine-elasticsearch/Dockerfilev0.12-alpine-loggly
docker-image/v0.12/alpine-loggly/Dockerfilev0.12-alpine-logentries
docker-image/v0.12/alpine-logentries/Dockerfilev0.12-alpine-cloudwatch
docker-image/v0.12/alpine-cloudwatch/Dockerfilev0.12-alpine-stackdriver
docker-image/v0.12/alpine-stackdriver/Dockerfilev0.12-alpine-s3
docker-image/v0.12/alpine-s3/Dockerfilev0.12-alpine-gcs
docker-image/v0.12/alpine-gcs/Dockerfilev0.12-alpine-papertrail
docker-image/v0.12/alpine-papertrail/Dockerfilev0.12-alpine-syslog
docker-image/v0.12/alpine-syslog/Dockerfilev0.12-alpine-graylog
docker-image/v0.12/alpine-graylog/Dockerfilev0.12-alpine-logzio
docker-image/v0.12/alpine-logzio/Dockerfilev0.12-alpine-kafka
docker-image/v0.12/alpine-kafka/Dockerfilev0.12-alpine-splunkhec
docker-image/v0.12/alpine-splunkhec/Dockerfilev0.12-alpine-kinesis
docker-image/v0.12/alpine-kinesis/Dockerfile
Fluentd is an open source data collector, which lets you unify the data collection and consumption for a better use and understanding of data.
The following repository expose images based on Alpine Linux and Debian. For production environments we strongly suggest to use Debian images.
Fluentd versioning is as follows:
Series | Description |
---|---|
v0.12 | Old stable, production ready |
v1.x | stable |
In Kubernetes and default setting, fluentd needs root permission to read logs in /var/log
and write pos_file
to /var/log
.
To avoid permission error, you need to set FLUENT_UID
environment variable to 0
in your Kubernetes configuration.
Some images are contributed by users. If you have a problem/question for following images, ask it to contributors.
- cloudwatch : @so0k
- papertrail : @alexouzounis
- kafka : @erhudy
- graylog : @rtnpro
- gcs : @andor-pierdelacabeza
- Amazon Kinesis : @shiftky
- logz.io : @SaMnCo / @jamielennox
- splunkhec: @FutureSharks
Kubernetes Logging with Fluentd
This daemonset setting mounts /var/log
as service account fluentd
so you need to run containers as privileged container.
Here is command example:
oc project kube-system
oc create -f https://raw.githubusercontent.com/fluent/fluentd-kubernetes-daemonset/master/fluentd-daemonset-elasticsearch-rbac.yaml
oc adm policy add-scc-to-user privileged -z fluentd
oc patch ds fluentd -p "spec:
template:
spec:
containers:
- name: fluentd
securityContext:
privileged: true"
oc delete pod -l k8s-app = fluentd-logging
This is from nekop's japanese article.
We can't notice comments in the DockerHub so don't use them for reporting issues or asking question.
If you have any problems with or questions about this image, please contact us through a GitHub issue.
Note: This file is generated from templates/README.md.erb