Google Kubernetes Engine (GKE)
Overview
Google Cloud Logging centralizes logs from Google Cloud products.
In this documentation, you will learn how to collect and send Google Cloud logs to SEKOIA.IO.
Configure
Before you begin working with PubSub, verify that you have the right permission.
Follow Google's documentation to configure a dedicated PubSub receiver. At the end of the documentation you should have done the following:
- Setup a project
- Create a topic
- Add a subscription (you should have the role
logging.admin
explicitly set on your account; for more information, see associated documentation) - Try your setup by publishing a message to the topic
Next, create a dedicated service account. At the end of the documentation you should have done the following:
- Create a service account with the role
Pub/Sub Subscriber
Note
To successfully activate the playbook further down this page, ensure the user has been granted the Pub/Sub Subscriber role for both the Topic and Subscription pages. Failure to do so will result in an error with status code 403.
- Create and download JSON keys (service account credentials)
You should now have:
- A credentials file
- A project ID
- A subscription ID
To pull events, you have to:
- Go to the intake's page
- Click on
+New intakes
to create a new intake
This intake consumes records from Google Pubsub and pushes them to Sekoia.io.
Fields description
Field | Meaning |
---|---|
name | Configuration name |
auth_provider_x509_cert_url | The URL of the public x509 certificate, used to verify the signature on JWTs, such as ID tokens, signed by the authentication provider. https://wwww.googleapis.com/oauth2/v1/certs |
auth_url | Google authentification url https://accounts.google.com/o/oauth2/auth |
client_email | Client email |
client_id | Client id |
client_x509_cert_url | The URL of the public x509 certificate, used to verify JWTs signed by the client |
private_key | Private key |
private_key_id | Private key id |
project_id | Project id |
token_uri | token server endpoint URI https://oauth2.googleapis.com/token |
type | Activity type service_account |
To start sending Logs to SEKOIA.IO, please create a Logs Router Sinks with an Inclusion Filter that fits your needs (Read the documentation dedicated to the product you want to monitor).
Last configuration on Google to setup is describe on each Intake.
Google Kubernetes Engine (GKE) configuration
There are different types of logs produced by GKE:
Auditd logs: Most important logs from a security point of view. We recommend that you use Auditbeat to collect Auditd logs.
Flow Logs: From Google VPC FLow Logs documentation:
VPC Flow Logs records a sample of network flows sent from and received by VM instances, including instances used as GKE nodes. These logs can be used for network monitoring, forensics, real-time security analysis, and expense optimization.
Please read the dedicated documentation. (Intake type: Google VPC Flow Logs)
Activity logs (Intake type: Google Cloud Audit log):
- operations done on GCP cluster resources (create a cluster, etc.)
resource.type: gke_cluster
- operations done on Kubernetes objects “inside” clusters (Kubernetes Audit Policy)
resource.type: k8s_cluster
Event logs: Kubernetes events are objects that provide insight into what is happening inside a cluster, such as what decisions were made by the scheduler or why some pods were evicted from the node log_id("events")
(Intake type: Google Cloud Audit log)
Node logs: Services running on GKE nodes (kubelet, node problem detector, container runtime, etc.) emit their own logs resource.type: k8s_node
Container logs: Container stdout and stderr streams log_id("stdout") log_id("stderr")
Instance logs: Serial console output log_id("serialconsole.googleapis.com/serial_port_1_output")
To learn more, consult the following resources:
Raw Events Samples
In this section, you will find examples of raw logs as generated natively by the source. These examples are provided to help integrators understand the data format before ingestion into Sekoia.io. It is crucial for setting up the correct parsing stages and ensuring that all relevant information is captured.
{
"insertId": "mf28fmdkt05bbyjk",
"jsonPayload": {
"_CAP_EFFECTIVE": "1ffffffffff",
"_BOOT_ID": "e61a95dc40fd44f6ba5c6bfcb18b46a2",
"_SYSTEMD_CGROUP": "/system.slice/containerd.service",
"_PID": "1478",
"_SYSTEMD_INVOCATION_ID": "ebd8a874b9bf4797a358a0403ec7e1e7",
"_EXE": "/usr/bin/containerd",
"_TRANSPORT": "stdout",
"_SYSTEMD_SLICE": "system.slice",
"MESSAGE": "time=\"2022-06-01T14:01:35.371006269Z\" level=info msg=\"StopContainer for \\\"4c2b21624d4488ea8305bec91bb58135e840ab50b779da3db19ddf87864a760e\\\" with timeout 30 (s)\"",
"_CMDLINE": "/usr/bin/containerd",
"_STREAM_ID": "949cd6779ed34897a1b74883881ddfe8",
"_HOSTNAME": "gke-cluster-1-default-pool-476246ab-wnl7",
"_COMM": "containerd",
"SYSLOG_IDENTIFIER": "containerd",
"_MACHINE_ID": "3fa273bf9f602a2286f55eac7ffa6d36",
"_GID": "0",
"_SYSTEMD_UNIT": "containerd.service",
"PRIORITY": "6",
"SYSLOG_FACILITY": "3",
"_UID": "0"
},
"resource": {
"type": "k8s_node",
"labels": {
"cluster_name": "cluster-1",
"project_id": "hazel-aria-348413",
"node_name": "gke-cluster-1-default-pool-476246ab-wnl7",
"location": "europe-west1-c"
}
},
"timestamp": "2022-06-01T14:01:35.371492Z",
"logName": "projects/hazel-aria-348413/logs/container-runtime",
"receiveTimestamp": "2022-06-01T14:01:36.219094561Z"
}
{
"insertId": "17ahw8eg29q74y6",
"jsonPayload": {
"reportingComponent": "",
"reason": "Pulling",
"eventTime": null,
"reportingInstance": "",
"kind": "Event",
"message": "Pulling image \"gke.gcr.io/prometheus-to-sd:v0.11.3-gke.0\"",
"apiVersion": "v1",
"type": "Normal",
"source": {
"host": "gke-cluster-1-default-pool-476246ab-wnl7",
"component": "kubelet"
},
"metadata": {
"resourceVersion": "954",
"creationTimestamp": "2022-06-01T14:05:30Z",
"namespace": "kube-system",
"managedFields": [
{
"manager": "kubelet",
"apiVersion": "v1",
"fieldsV1": {
"f:message": {},
"f:involvedObject": {},
"f:lastTimestamp": {},
"f:source": {
"f:host": {},
"f:component": {}
},
"f:type": {},
"f:reason": {},
"f:count": {},
"f:firstTimestamp": {}
},
"operation": "Update",
"fieldsType": "FieldsV1",
"time": "2022-06-01T14:05:30Z"
}
],
"uid": "658b3d26-ed26-4d32-a5b4-3bb87bdefa99",
"name": "kube-dns-56494768b7-544n6.16f48435f72a4bd9"
},
"involvedObject": {
"resourceVersion": "6551",
"namespace": "kube-system",
"fieldPath": "spec.containers{prometheus-to-sd}",
"apiVersion": "v1",
"name": "kube-dns-56494768b7-544n6",
"uid": "52017f74-5157-4788-a62e-b83c4eac4acf",
"kind": "Pod"
}
},
"resource": {
"type": "k8s_pod",
"labels": {
"location": "europe-west1-c",
"namespace_name": "kube-system",
"cluster_name": "cluster-1",
"pod_name": "kube-dns-56494768b7-544n6",
"project_id": "hazel-aria-348413"
}
},
"timestamp": "2022-06-01T14:05:30Z",
"severity": "INFO",
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-01T14:05:39.683992581Z"
}
{
"insertId": "17ahw8eg29q74yc",
"jsonPayload": {
"eventTime": null,
"reportingInstance": "",
"type": "Warning",
"reportingComponent": "",
"metadata": {
"resourceVersion": "960",
"name": "kube-dns.16f484369d214dae",
"namespace": "kube-system",
"uid": "828b8cd3-1eec-4093-95fb-907ebeab0efa",
"creationTimestamp": "2022-06-01T14:05:33Z",
"managedFields": [
{
"apiVersion": "v1",
"operation": "Update",
"fieldsV1": {
"f:firstTimestamp": {},
"f:involvedObject": {},
"f:reason": {},
"f:count": {},
"f:lastTimestamp": {},
"f:type": {},
"f:message": {},
"f:source": {
"f:component": {}
}
},
"manager": "kube-controller-manager",
"time": "2022-06-01T14:05:33Z",
"fieldsType": "FieldsV1"
}
]
},
"apiVersion": "v1",
"kind": "Event",
"message": "Failed to update endpoint kube-system/kube-dns: Operation cannot be fulfilled on endpoints \"kube-dns\": the object has been modified; please apply your changes to the latest version and try again",
"source": {
"component": "endpoint-controller"
},
"involvedObject": {
"apiVersion": "v1",
"uid": "75cc3b54-2a5f-42fa-8dd9-1669695113cd",
"kind": "Endpoints",
"namespace": "kube-system",
"resourceVersion": "7416",
"name": "kube-dns"
},
"reason": "FailedToUpdateEndpoint"
},
"resource": {
"type": "k8s_cluster",
"labels": {
"cluster_name": "cluster-1",
"location": "europe-west1-c",
"project_id": "hazel-aria-348413"
}
},
"timestamp": "2022-06-01T14:05:33Z",
"severity": "WARNING",
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-01T14:05:39.683992581Z"
}
{
"insertId": "17ahw8eg29q74yb",
"jsonPayload": {
"involvedObject": {
"namespace": "kube-system",
"uid": "52017f74-5157-4788-a62e-b83c4eac4acf",
"kind": "Pod",
"resourceVersion": "6551",
"fieldPath": "spec.containers{prometheus-to-sd}",
"apiVersion": "v1",
"name": "kube-dns-56494768b7-544n6"
},
"kind": "Event",
"apiVersion": "v1",
"eventTime": null,
"reportingInstance": "",
"metadata": {
"managedFields": [
{
"time": "2022-06-01T14:05:32Z",
"manager": "kubelet",
"fieldsType": "FieldsV1",
"operation": "Update",
"apiVersion": "v1",
"fieldsV1": {
"f:count": {},
"f:type": {},
"f:involvedObject": {},
"f:source": {
"f:component": {},
"f:host": {}
},
"f:reason": {},
"f:firstTimestamp": {},
"f:message": {},
"f:lastTimestamp": {}
}
}
],
"namespace": "kube-system",
"creationTimestamp": "2022-06-01T14:05:32Z",
"name": "kube-dns-56494768b7-544n6.16f48436899e3f4a",
"resourceVersion": "959",
"uid": "2836bb34-8703-4475-a7d8-5cf0ec2232f8"
},
"message": "Created container prometheus-to-sd",
"reason": "Created",
"type": "Normal",
"source": {
"host": "gke-cluster-1-default-pool-476246ab-wnl7",
"component": "kubelet"
},
"reportingComponent": ""
},
"resource": {
"type": "k8s_pod",
"labels": {
"project_id": "hazel-aria-348413",
"namespace_name": "kube-system",
"cluster_name": "cluster-1",
"pod_name": "kube-dns-56494768b7-544n6",
"location": "europe-west1-c"
}
},
"timestamp": "2022-06-01T14:05:32Z",
"severity": "INFO",
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-01T14:05:39.683992581Z"
}
{
"insertId": "32ez47f5wz17i",
"jsonPayload": {
"apiVersion": "v1",
"eventTime": null,
"involvedObject": {
"kind": "Node",
"name": "gke-cluster-1-default-pool-eb66079e-k3zf",
"uid": "gke-cluster-1-default-pool-eb66079e-k3zf"
},
"kind": "Event",
"message": "{\"unmanaged\": {\"net.netfilter.nf_conntrack_buckets\": \"32768\"}}",
"metadata": {
"creationTimestamp": "2022-06-15T01:55:51Z",
"managedFields": [
{
"apiVersion": "v1",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:count": {},
"f:firstTimestamp": {},
"f:involvedObject": {},
"f:lastTimestamp": {},
"f:message": {},
"f:reason": {},
"f:source": {
"f:component": {},
"f:host": {}
},
"f:type": {}
},
"manager": "node-problem-detector",
"operation": "Update",
"time": "2022-06-15T01:55:51Z"
}
],
"name": "gke-cluster-1-default-pool-eb66079e-k3zf.16f8813a8514b8c0",
"namespace": "default",
"resourceVersion": "894",
"uid": "7e26b736-331a-4896-961f-96688918ba7e"
},
"reason": "NodeSysctlChange",
"reportingComponent": "",
"reportingInstance": "",
"source": {
"component": "sysctl-monitor",
"host": "gke-cluster-1-default-pool-eb66079e-k3zf"
},
"type": "Warning"
},
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-15T01:55:52.012275121Z",
"resource": {
"labels": {
"cluster_name": "cluster-1",
"location": "europe-central2-a",
"node_name": "gke-cluster-1-default-pool-eb66079e-k3zf",
"project_id": "hazel-aria-348413"
},
"type": "k8s_node"
},
"severity": "WARNING",
"timestamp": "2022-06-15T01:55:51Z"
}
{
"insertId": "1wtrhknf2gg14w",
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-16T09:42:59.259491841Z",
"resource": {
"labels": {
"cluster_name": "cluster-1",
"location": "europe-central2-a",
"project_id": "hazel-aria-348413"
},
"type": "k8s_cluster"
},
"severity": "WARNING",
"textPayload": "Event exporter started watching. Some events may have been lost up to this point.",
"timestamp": "2022-06-16T09:42:39.200653463Z"
}
Detection section
The following section provides information for those who wish to learn more about the detection capabilities enabled by collecting this intake. It includes details about the built-in rule catalog, event categories, and ECS fields extracted from raw events. This is essential for users aiming to create custom detection rules, perform hunting activities, or pivot in the events page.
Event Categories
The following table lists the data source offered by this integration.
Data Source | Description |
---|---|
Application logs |
Google Kubernetes Engine logs contains events from applications deployed in Google Cloud containers. |
In details, the following table denotes the type of events produced by this integration.
Name | Values |
---|---|
Kind | `` |
Category | process |
Type | change |
Transformed Events Samples after Ingestion
This section demonstrates how the raw logs will be transformed by our parsers. It shows the extracted fields that will be available for use in the built-in detection rules and hunting activities in the events page. Understanding these transformations is essential for analysts to create effective detection mechanisms with custom detection rules and to leverage the full potential of the collected data.
{
"message": "{\n \"insertId\": \"mf28fmdkt05bbyjk\",\n \"jsonPayload\": {\n \"_CAP_EFFECTIVE\": \"1ffffffffff\",\n \"_BOOT_ID\": \"e61a95dc40fd44f6ba5c6bfcb18b46a2\",\n \"_SYSTEMD_CGROUP\": \"/system.slice/containerd.service\",\n \"_PID\": \"1478\",\n \"_SYSTEMD_INVOCATION_ID\": \"ebd8a874b9bf4797a358a0403ec7e1e7\",\n \"_EXE\": \"/usr/bin/containerd\",\n \"_TRANSPORT\": \"stdout\",\n \"_SYSTEMD_SLICE\": \"system.slice\",\n \"MESSAGE\": \"time=\\\"2022-06-01T14:01:35.371006269Z\\\" level=info msg=\\\"StopContainer for \\\\\\\"4c2b21624d4488ea8305bec91bb58135e840ab50b779da3db19ddf87864a760e\\\\\\\" with timeout 30 (s)\\\"\",\n \"_CMDLINE\": \"/usr/bin/containerd\",\n \"_STREAM_ID\": \"949cd6779ed34897a1b74883881ddfe8\",\n \"_HOSTNAME\": \"gke-cluster-1-default-pool-476246ab-wnl7\",\n \"_COMM\": \"containerd\",\n \"SYSLOG_IDENTIFIER\": \"containerd\",\n \"_MACHINE_ID\": \"3fa273bf9f602a2286f55eac7ffa6d36\",\n \"_GID\": \"0\",\n \"_SYSTEMD_UNIT\": \"containerd.service\",\n \"PRIORITY\": \"6\",\n \"SYSLOG_FACILITY\": \"3\",\n \"_UID\": \"0\"\n },\n \"resource\": {\n \"type\": \"k8s_node\",\n \"labels\": {\n \"cluster_name\": \"cluster-1\",\n \"project_id\": \"hazel-aria-348413\",\n \"node_name\": \"gke-cluster-1-default-pool-476246ab-wnl7\",\n \"location\": \"europe-west1-c\"\n }\n },\n \"timestamp\": \"2022-06-01T14:01:35.371492Z\",\n \"logName\": \"projects/hazel-aria-348413/logs/container-runtime\",\n \"receiveTimestamp\": \"2022-06-01T14:01:36.219094561Z\"\n}",
"event": {
"category": [
"process"
],
"reason": "StopContainer for \\\"4c2b21624d4488ea8305bec91bb58135e840ab50b779da3db19ddf87864a760e\\\" with timeout 30 (s)",
"type": [
"change"
]
},
"@timestamp": "2022-06-01T14:01:35.371492Z",
"cloud": {
"project": {
"id": "hazel-aria-348413"
}
},
"google_kubernetes_engine": {
"insertId": "mf28fmdkt05bbyjk",
"jsonPayload": {
"MESSAGE": "time=\"2022-06-01T14:01:35.371006269Z\" level=info msg=\"StopContainer for \\\"4c2b21624d4488ea8305bec91bb58135e840ab50b779da3db19ddf87864a760e\\\" with timeout 30 (s)\"",
"SYSLOG_IDENTIFIER": "containerd",
"_BOOT_ID": "e61a95dc40fd44f6ba5c6bfcb18b46a2",
"_CAP_EFFECTIVE": "1ffffffffff",
"_COMM": "containerd",
"_GID": 0,
"_STREAM_ID": "949cd6779ed34897a1b74883881ddfe8",
"_SYSTEMD_CGROUP": "/system.slice/containerd.service",
"_SYSTEMD_INVOCATION_ID": "ebd8a874b9bf4797a358a0403ec7e1e7",
"_SYSTEMD_SLICE": "system.slice",
"_SYSTEMD_UNIT": "containerd.service",
"_TRANSPORT": "stdout",
"_UID": "0"
},
"logName": "projects/hazel-aria-348413/logs/container-runtime",
"receiveTimestamp": "2022-06-01T14:01:36.219094561Z"
},
"host": {
"id": "3fa273bf9f602a2286f55eac7ffa6d36",
"name": "gke-cluster-1-default-pool-476246ab-wnl7"
},
"log": {
"syslog": {
"facility": {
"code": 3
},
"priority": 6
}
},
"orchestrator": {
"cluster": {
"name": "cluster-1"
},
"resource": {
"type": "k8s_node"
},
"type": "kubernetes"
},
"process": {
"command_line": "/usr/bin/containerd",
"executable": "/usr/bin/containerd",
"pid": 1478
},
"server": {
"geo": {
"name": "europe-west1-c"
}
}
}
{
"message": "{\n \"insertId\": \"17ahw8eg29q74y6\",\n \"jsonPayload\": {\n \"reportingComponent\": \"\",\n \"reason\": \"Pulling\",\n \"eventTime\": null,\n \"reportingInstance\": \"\",\n \"kind\": \"Event\",\n \"message\": \"Pulling image \\\"gke.gcr.io/prometheus-to-sd:v0.11.3-gke.0\\\"\",\n \"apiVersion\": \"v1\",\n \"type\": \"Normal\",\n \"source\": {\n \"host\": \"gke-cluster-1-default-pool-476246ab-wnl7\",\n \"component\": \"kubelet\"\n },\n \"metadata\": {\n \"resourceVersion\": \"954\",\n \"creationTimestamp\": \"2022-06-01T14:05:30Z\",\n \"namespace\": \"kube-system\",\n \"managedFields\": [\n {\n \"manager\": \"kubelet\",\n \"apiVersion\": \"v1\",\n \"fieldsV1\": {\n \"f:message\": {},\n \"f:involvedObject\": {},\n \"f:lastTimestamp\": {},\n \"f:source\": {\n \"f:host\": {},\n \"f:component\": {}\n },\n \"f:type\": {},\n \"f:reason\": {},\n \"f:count\": {},\n \"f:firstTimestamp\": {}\n },\n \"operation\": \"Update\",\n \"fieldsType\": \"FieldsV1\",\n \"time\": \"2022-06-01T14:05:30Z\"\n }\n ],\n \"uid\": \"658b3d26-ed26-4d32-a5b4-3bb87bdefa99\",\n \"name\": \"kube-dns-56494768b7-544n6.16f48435f72a4bd9\"\n },\n \"involvedObject\": {\n \"resourceVersion\": \"6551\",\n \"namespace\": \"kube-system\",\n \"fieldPath\": \"spec.containers{prometheus-to-sd}\",\n \"apiVersion\": \"v1\",\n \"name\": \"kube-dns-56494768b7-544n6\",\n \"uid\": \"52017f74-5157-4788-a62e-b83c4eac4acf\",\n \"kind\": \"Pod\"\n }\n },\n \"resource\": {\n \"type\": \"k8s_pod\",\n \"labels\": {\n \"location\": \"europe-west1-c\",\n \"namespace_name\": \"kube-system\",\n \"cluster_name\": \"cluster-1\",\n \"pod_name\": \"kube-dns-56494768b7-544n6\",\n \"project_id\": \"hazel-aria-348413\"\n }\n },\n \"timestamp\": \"2022-06-01T14:05:30Z\",\n \"severity\": \"INFO\",\n \"logName\": \"projects/hazel-aria-348413/logs/events\",\n \"receiveTimestamp\": \"2022-06-01T14:05:39.683992581Z\"\n}",
"event": {
"action": "Pulling",
"category": [
"process"
],
"reason": "Pulling image \"gke.gcr.io/prometheus-to-sd:v0.11.3-gke.0\"",
"type": [
"change"
]
},
"@timestamp": "2022-06-01T14:05:30Z",
"cloud": {
"project": {
"id": "hazel-aria-348413"
}
},
"google_kubernetes_engine": {
"insertId": "17ahw8eg29q74y6",
"jsonPayload": {
"apiVersion": "v1",
"involvedObject": {
"fieldPath": "spec.containers{prometheus-to-sd}",
"kind": "Pod",
"name": "kube-dns-56494768b7-544n6",
"resourceVersion": "6551",
"uid": "52017f74-5157-4788-a62e-b83c4eac4acf"
},
"kind": "Event",
"metadata": {
"creationTimestamp": "2022-06-01T14:05:30Z",
"managedFields": [
{
"apiVersion": "v1",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:count": {},
"f:firstTimestamp": {},
"f:involvedObject": {},
"f:lastTimestamp": {},
"f:message": {},
"f:reason": {},
"f:source": {
"f:component": {},
"f:host": {}
},
"f:type": {}
},
"manager": "kubelet",
"operation": "Update",
"time": "2022-06-01T14:05:30Z"
}
],
"resourceVersion": "954",
"uid": "658b3d26-ed26-4d32-a5b4-3bb87bdefa99"
},
"source": {
"component": "kubelet"
},
"type": "Normal"
},
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-01T14:05:39.683992581Z",
"severity": "INFO"
},
"host": {
"name": "gke-cluster-1-default-pool-476246ab-wnl7"
},
"orchestrator": {
"api_version": "v1",
"cluster": {
"name": "cluster-1"
},
"namespace": "kube-system",
"resource": {
"name": "kube-dns-56494768b7-544n6",
"type": "k8s_pod"
},
"type": "kubernetes"
},
"server": {
"geo": {
"name": "europe-west1-c"
}
}
}
{
"message": "{\n \"insertId\": \"17ahw8eg29q74yc\",\n \"jsonPayload\": {\n \"eventTime\": null,\n \"reportingInstance\": \"\",\n \"type\": \"Warning\",\n \"reportingComponent\": \"\",\n \"metadata\": {\n \"resourceVersion\": \"960\",\n \"name\": \"kube-dns.16f484369d214dae\",\n \"namespace\": \"kube-system\",\n \"uid\": \"828b8cd3-1eec-4093-95fb-907ebeab0efa\",\n \"creationTimestamp\": \"2022-06-01T14:05:33Z\",\n \"managedFields\": [\n {\n \"apiVersion\": \"v1\",\n \"operation\": \"Update\",\n \"fieldsV1\": {\n \"f:firstTimestamp\": {},\n \"f:involvedObject\": {},\n \"f:reason\": {},\n \"f:count\": {},\n \"f:lastTimestamp\": {},\n \"f:type\": {},\n \"f:message\": {},\n \"f:source\": {\n \"f:component\": {}\n }\n },\n \"manager\": \"kube-controller-manager\",\n \"time\": \"2022-06-01T14:05:33Z\",\n \"fieldsType\": \"FieldsV1\"\n }\n ]\n },\n \"apiVersion\": \"v1\",\n \"kind\": \"Event\",\n \"message\": \"Failed to update endpoint kube-system/kube-dns: Operation cannot be fulfilled on endpoints \\\"kube-dns\\\": the object has been modified; please apply your changes to the latest version and try again\",\n \"source\": {\n \"component\": \"endpoint-controller\"\n },\n \"involvedObject\": {\n \"apiVersion\": \"v1\",\n \"uid\": \"75cc3b54-2a5f-42fa-8dd9-1669695113cd\",\n \"kind\": \"Endpoints\",\n \"namespace\": \"kube-system\",\n \"resourceVersion\": \"7416\",\n \"name\": \"kube-dns\"\n },\n \"reason\": \"FailedToUpdateEndpoint\"\n },\n \"resource\": {\n \"type\": \"k8s_cluster\",\n \"labels\": {\n \"cluster_name\": \"cluster-1\",\n \"location\": \"europe-west1-c\",\n \"project_id\": \"hazel-aria-348413\"\n }\n },\n \"timestamp\": \"2022-06-01T14:05:33Z\",\n \"severity\": \"WARNING\",\n \"logName\": \"projects/hazel-aria-348413/logs/events\",\n \"receiveTimestamp\": \"2022-06-01T14:05:39.683992581Z\"\n}",
"event": {
"action": "FailedToUpdateEndpoint",
"category": [
"process"
],
"reason": "Failed to update endpoint kube-system/kube-dns: Operation cannot be fulfilled on endpoints \"kube-dns\": the object has been modified; please apply your changes to the latest version and try again",
"type": [
"change"
]
},
"@timestamp": "2022-06-01T14:05:33Z",
"cloud": {
"project": {
"id": "hazel-aria-348413"
}
},
"google_kubernetes_engine": {
"insertId": "17ahw8eg29q74yc",
"jsonPayload": {
"apiVersion": "v1",
"involvedObject": {
"kind": "Endpoints",
"name": "kube-dns",
"resourceVersion": "7416",
"uid": "75cc3b54-2a5f-42fa-8dd9-1669695113cd"
},
"kind": "Event",
"metadata": {
"creationTimestamp": "2022-06-01T14:05:33Z",
"managedFields": [
{
"apiVersion": "v1",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:count": {},
"f:firstTimestamp": {},
"f:involvedObject": {},
"f:lastTimestamp": {},
"f:message": {},
"f:reason": {},
"f:source": {
"f:component": {}
},
"f:type": {}
},
"manager": "kube-controller-manager",
"operation": "Update",
"time": "2022-06-01T14:05:33Z"
}
],
"resourceVersion": "960",
"uid": "828b8cd3-1eec-4093-95fb-907ebeab0efa"
},
"source": {
"component": "endpoint-controller"
},
"type": "Warning"
},
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-01T14:05:39.683992581Z",
"severity": "WARNING"
},
"host": {
"name": "kube-dns.16f484369d214dae"
},
"orchestrator": {
"api_version": "v1",
"cluster": {
"name": "cluster-1"
},
"namespace": "kube-system",
"resource": {
"type": "k8s_cluster"
},
"type": "kubernetes"
},
"server": {
"geo": {
"name": "europe-west1-c"
}
}
}
{
"message": "{\n \"insertId\": \"17ahw8eg29q74yb\",\n \"jsonPayload\": {\n \"involvedObject\": {\n \"namespace\": \"kube-system\",\n \"uid\": \"52017f74-5157-4788-a62e-b83c4eac4acf\",\n \"kind\": \"Pod\",\n \"resourceVersion\": \"6551\",\n \"fieldPath\": \"spec.containers{prometheus-to-sd}\",\n \"apiVersion\": \"v1\",\n \"name\": \"kube-dns-56494768b7-544n6\"\n },\n \"kind\": \"Event\",\n \"apiVersion\": \"v1\",\n \"eventTime\": null,\n \"reportingInstance\": \"\",\n \"metadata\": {\n \"managedFields\": [\n {\n \"time\": \"2022-06-01T14:05:32Z\",\n \"manager\": \"kubelet\",\n \"fieldsType\": \"FieldsV1\",\n \"operation\": \"Update\",\n \"apiVersion\": \"v1\",\n \"fieldsV1\": {\n \"f:count\": {},\n \"f:type\": {},\n \"f:involvedObject\": {},\n \"f:source\": {\n \"f:component\": {},\n \"f:host\": {}\n },\n \"f:reason\": {},\n \"f:firstTimestamp\": {},\n \"f:message\": {},\n \"f:lastTimestamp\": {}\n }\n }\n ],\n \"namespace\": \"kube-system\",\n \"creationTimestamp\": \"2022-06-01T14:05:32Z\",\n \"name\": \"kube-dns-56494768b7-544n6.16f48436899e3f4a\",\n \"resourceVersion\": \"959\",\n \"uid\": \"2836bb34-8703-4475-a7d8-5cf0ec2232f8\"\n },\n \"message\": \"Created container prometheus-to-sd\",\n \"reason\": \"Created\",\n \"type\": \"Normal\",\n \"source\": {\n \"host\": \"gke-cluster-1-default-pool-476246ab-wnl7\",\n \"component\": \"kubelet\"\n },\n \"reportingComponent\": \"\"\n },\n \"resource\": {\n \"type\": \"k8s_pod\",\n \"labels\": {\n \"project_id\": \"hazel-aria-348413\",\n \"namespace_name\": \"kube-system\",\n \"cluster_name\": \"cluster-1\",\n \"pod_name\": \"kube-dns-56494768b7-544n6\",\n \"location\": \"europe-west1-c\"\n }\n },\n \"timestamp\": \"2022-06-01T14:05:32Z\",\n \"severity\": \"INFO\",\n \"logName\": \"projects/hazel-aria-348413/logs/events\",\n \"receiveTimestamp\": \"2022-06-01T14:05:39.683992581Z\"\n}",
"event": {
"action": "Created",
"category": [
"process"
],
"reason": "Created container prometheus-to-sd",
"type": [
"change"
]
},
"@timestamp": "2022-06-01T14:05:32Z",
"cloud": {
"project": {
"id": "hazel-aria-348413"
}
},
"google_kubernetes_engine": {
"insertId": "17ahw8eg29q74yb",
"jsonPayload": {
"apiVersion": "v1",
"involvedObject": {
"fieldPath": "spec.containers{prometheus-to-sd}",
"kind": "Pod",
"name": "kube-dns-56494768b7-544n6",
"resourceVersion": "6551",
"uid": "52017f74-5157-4788-a62e-b83c4eac4acf"
},
"kind": "Event",
"metadata": {
"creationTimestamp": "2022-06-01T14:05:32Z",
"managedFields": [
{
"apiVersion": "v1",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:count": {},
"f:firstTimestamp": {},
"f:involvedObject": {},
"f:lastTimestamp": {},
"f:message": {},
"f:reason": {},
"f:source": {
"f:component": {},
"f:host": {}
},
"f:type": {}
},
"manager": "kubelet",
"operation": "Update",
"time": "2022-06-01T14:05:32Z"
}
],
"resourceVersion": "959",
"uid": "2836bb34-8703-4475-a7d8-5cf0ec2232f8"
},
"source": {
"component": "kubelet"
},
"type": "Normal"
},
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-01T14:05:39.683992581Z",
"severity": "INFO"
},
"host": {
"name": "gke-cluster-1-default-pool-476246ab-wnl7"
},
"orchestrator": {
"api_version": "v1",
"cluster": {
"name": "cluster-1"
},
"namespace": "kube-system",
"resource": {
"name": "kube-dns-56494768b7-544n6",
"type": "k8s_pod"
},
"type": "kubernetes"
},
"server": {
"geo": {
"name": "europe-west1-c"
}
}
}
{
"message": "{\"insertId\":\"32ez47f5wz17i\",\"jsonPayload\":{\"apiVersion\":\"v1\",\"eventTime\":null,\"involvedObject\":{\"kind\":\"Node\",\"name\":\"gke-cluster-1-default-pool-eb66079e-k3zf\",\"uid\":\"gke-cluster-1-default-pool-eb66079e-k3zf\"},\"kind\":\"Event\",\"message\":\"{\\\"unmanaged\\\": {\\\"net.netfilter.nf_conntrack_buckets\\\": \\\"32768\\\"}}\",\"metadata\":{\"creationTimestamp\":\"2022-06-15T01:55:51Z\",\"managedFields\":[{\"apiVersion\":\"v1\",\"fieldsType\":\"FieldsV1\",\"fieldsV1\":{\"f:count\":{},\"f:firstTimestamp\":{},\"f:involvedObject\":{},\"f:lastTimestamp\":{},\"f:message\":{},\"f:reason\":{},\"f:source\":{\"f:component\":{},\"f:host\":{}},\"f:type\":{}},\"manager\":\"node-problem-detector\",\"operation\":\"Update\",\"time\":\"2022-06-15T01:55:51Z\"}],\"name\":\"gke-cluster-1-default-pool-eb66079e-k3zf.16f8813a8514b8c0\",\"namespace\":\"default\",\"resourceVersion\":\"894\",\"uid\":\"7e26b736-331a-4896-961f-96688918ba7e\"},\"reason\":\"NodeSysctlChange\",\"reportingComponent\":\"\",\"reportingInstance\":\"\",\"source\":{\"component\":\"sysctl-monitor\",\"host\":\"gke-cluster-1-default-pool-eb66079e-k3zf\"},\"type\":\"Warning\"},\"logName\":\"projects/hazel-aria-348413/logs/events\",\"receiveTimestamp\":\"2022-06-15T01:55:52.012275121Z\",\"resource\":{\"labels\":{\"cluster_name\":\"cluster-1\",\"location\":\"europe-central2-a\",\"node_name\":\"gke-cluster-1-default-pool-eb66079e-k3zf\",\"project_id\":\"hazel-aria-348413\"},\"type\":\"k8s_node\"},\"severity\":\"WARNING\",\"timestamp\":\"2022-06-15T01:55:51Z\"}",
"event": {
"action": "NodeSysctlChange",
"category": [
"process"
],
"reason": "{\"unmanaged\": {\"net.netfilter.nf_conntrack_buckets\": \"32768\"}}",
"type": [
"change"
]
},
"@timestamp": "2022-06-15T01:55:51Z",
"cloud": {
"project": {
"id": "hazel-aria-348413"
}
},
"google_kubernetes_engine": {
"insertId": "32ez47f5wz17i",
"jsonPayload": {
"apiVersion": "v1",
"involvedObject": {
"kind": "Node",
"name": "gke-cluster-1-default-pool-eb66079e-k3zf",
"uid": "gke-cluster-1-default-pool-eb66079e-k3zf"
},
"kind": "Event",
"metadata": {
"creationTimestamp": "2022-06-15T01:55:51Z",
"managedFields": [
{
"apiVersion": "v1",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:count": {},
"f:firstTimestamp": {},
"f:involvedObject": {},
"f:lastTimestamp": {},
"f:message": {},
"f:reason": {},
"f:source": {
"f:component": {},
"f:host": {}
},
"f:type": {}
},
"manager": "node-problem-detector",
"operation": "Update",
"time": "2022-06-15T01:55:51Z"
}
],
"resourceVersion": "894",
"uid": "7e26b736-331a-4896-961f-96688918ba7e"
},
"source": {
"component": "sysctl-monitor"
},
"type": "Warning"
},
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-15T01:55:52.012275121Z",
"severity": "WARNING"
},
"host": {
"name": "gke-cluster-1-default-pool-eb66079e-k3zf"
},
"orchestrator": {
"cluster": {
"name": "cluster-1"
},
"namespace": "default",
"resource": {
"type": "k8s_node"
},
"type": "kubernetes"
},
"server": {
"geo": {
"name": "europe-central2-a"
}
}
}
{
"message": "{\"insertId\":\"1wtrhknf2gg14w\",\"logName\":\"projects/hazel-aria-348413/logs/events\",\"receiveTimestamp\":\"2022-06-16T09:42:59.259491841Z\",\"resource\":{\"labels\":{\"cluster_name\":\"cluster-1\",\"location\":\"europe-central2-a\",\"project_id\":\"hazel-aria-348413\"},\"type\":\"k8s_cluster\"},\"severity\":\"WARNING\",\"textPayload\":\"Event exporter started watching. Some events may have been lost up to this point.\",\"timestamp\":\"2022-06-16T09:42:39.200653463Z\"}",
"event": {
"category": [
"process"
],
"reason": "Event exporter started watching. Some events may have been lost up to this point.",
"type": [
"change"
]
},
"@timestamp": "2022-06-16T09:42:39.200653Z",
"cloud": {
"project": {
"id": "hazel-aria-348413"
}
},
"google_kubernetes_engine": {
"insertId": "1wtrhknf2gg14w",
"logName": "projects/hazel-aria-348413/logs/events",
"receiveTimestamp": "2022-06-16T09:42:59.259491841Z",
"severity": "WARNING"
},
"orchestrator": {
"cluster": {
"name": "cluster-1"
},
"type": "kubernetes"
},
"server": {
"geo": {
"name": "europe-central2-a"
}
}
}
Extracted Fields
The following table lists the fields that are extracted, normalized under the ECS format, analyzed and indexed by the parser. It should be noted that infered fields are not listed.
Name | Type | Description |
---|---|---|
@timestamp |
date |
Date/time when the event originated. |
cloud.project.id |
keyword |
The cloud project id. |
event.action |
keyword |
The action captured by the event. |
event.category |
keyword |
Event category. The second categorization field in the hierarchy. |
event.reason |
keyword |
Reason why this event happened, according to the source |
event.type |
keyword |
Event type. The third categorization field in the hierarchy. |
google_kubernetes_engine.insertId |
keyword |
|
google_kubernetes_engine.jsonPayload.MESSAGE |
keyword |
|
google_kubernetes_engine.jsonPayload.SYSLOG_IDENTIFIER |
keyword |
|
google_kubernetes_engine.jsonPayload._BOOT_ID |
keyword |
|
google_kubernetes_engine.jsonPayload._CAP_EFFECTIVE |
keyword |
|
google_kubernetes_engine.jsonPayload._COMM |
keyword |
|
google_kubernetes_engine.jsonPayload._GID |
number |
|
google_kubernetes_engine.jsonPayload._STREAM_ID |
keyword |
|
google_kubernetes_engine.jsonPayload._SYSTEMD_CGROUP |
keyword |
|
google_kubernetes_engine.jsonPayload._SYSTEMD_INVOCATION_ID |
keyword |
|
google_kubernetes_engine.jsonPayload._SYSTEMD_SLICE |
keyword |
|
google_kubernetes_engine.jsonPayload._SYSTEMD_UNIT |
keyword |
|
google_kubernetes_engine.jsonPayload._TRANSPORT |
keyword |
|
google_kubernetes_engine.jsonPayload._UID |
keyword |
|
google_kubernetes_engine.jsonPayload.apiVersion |
keyword |
|
google_kubernetes_engine.jsonPayload.eventTime |
keyword |
|
google_kubernetes_engine.jsonPayload.involvedObject.fieldPath |
keyword |
|
google_kubernetes_engine.jsonPayload.involvedObject.kind |
keyword |
|
google_kubernetes_engine.jsonPayload.involvedObject.name |
keyword |
|
google_kubernetes_engine.jsonPayload.involvedObject.resourceVersion |
keyword |
|
google_kubernetes_engine.jsonPayload.involvedObject.uid |
keyword |
|
google_kubernetes_engine.jsonPayload.kind |
keyword |
|
google_kubernetes_engine.jsonPayload.metadata.creationTimestamp |
keyword |
|
google_kubernetes_engine.jsonPayload.metadata.managedFields |
array |
|
google_kubernetes_engine.jsonPayload.metadata.resourceVersion |
keyword |
|
google_kubernetes_engine.jsonPayload.metadata.uid |
keyword |
|
google_kubernetes_engine.jsonPayload.reportingComponent |
keyword |
|
google_kubernetes_engine.jsonPayload.reportingInstance |
keyword |
|
google_kubernetes_engine.jsonPayload.source.component |
keyword |
|
google_kubernetes_engine.jsonPayload.type |
keyword |
|
google_kubernetes_engine.labels.authorization.k8s.io.decision |
keyword |
|
google_kubernetes_engine.logName |
keyword |
|
google_kubernetes_engine.receiveTimestamp |
keyword |
|
google_kubernetes_engine.severity |
keyword |
|
host.id |
keyword |
Unique host id. |
host.name |
keyword |
Name of the host. |
log.syslog.facility.code |
long |
Syslog numeric facility of the event. |
log.syslog.priority |
long |
Syslog priority of the event. |
orchestrator.api_version |
keyword |
API version being used to carry out the action |
orchestrator.cluster.name |
keyword |
Name of the cluster. |
orchestrator.namespace |
keyword |
Namespace in which the action is taking place. |
orchestrator.resource.name |
keyword |
Name of the resource being acted upon. |
orchestrator.resource.type |
keyword |
Type of resource being acted upon. |
orchestrator.type |
keyword |
Orchestrator cluster type (e.g. kubernetes, nomad or cloudfoundry). |
process.command_line |
wildcard |
Full command line that started the process. |
process.executable |
keyword |
Absolute path to the process executable. |
process.pid |
long |
Process id. |
server.geo.name |
keyword |
User-defined description of a location. |
For more information on the Intake Format, please find the code of the Parser, Smart Descriptions, and Supported Events here.