[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[],[],null,["# Logging overview\n\nLogs are essential for maintaining your air-gapped deployments' health,\nsecurity, and operational efficiency. They provide valuable insights into the\nfollowing aspects of an environment:\n\n- **Application behavior**: Identify errors, performance issues, and unusual activity within your applications.\n- **System activity**: Monitor the performance and health of underlying infrastructure components.\n- **Security auditing**: Track user actions, access control events, and potential security threats.\n- **Troubleshooting**: Diagnose and resolve issues by analyzing historical log data.\n\nTherefore, Google Distributed Cloud (GDC) air-gapped appliance provides a logging platform for\ncollecting and analyzing your logs. GDC captures the\nfollowing two types of logs:\n\n- **Audit logs**: Record user and administrative activities on privileged operations and achieve auditing and compliance requirements on GDC.\n- **Operational logs**: Record conditions, changes, and actions as you manage ongoing operations in applications and services on GDC. These logs help developers and operators test and debug applications.\n\nThis page provides an overview of logging features in\nGDC environments and explains the key concepts and\ncomponents involved in managing logs generated by your applications and the\nplatform itself.\n\nKey components\n--------------\n\nGDC deployments use a logging platform to collect and\nstore logs from various sources. This platform includes the following\ncomponents:\n\n- **Fluent Bit**: A lightweight log processor and forwarder deployed on each cluster node. Fluent Bit collects logs from applications, system components, and Kubernetes itself.\n- **Loki**: An open-source log aggregation system that stores and queries logs from your applications and infrastructure.\n- **Log sinks**: Log routers that export log entries to other destinations, such as a local storage system or a security information and event management (SIEM) tool. These log sinks give you flexibility in managing and analyzing your log data.\n- **Logging pipeline**: A managed service that stores log data and implements the logic for log collection. In air-gapped environments, the logging pipeline runs locally within your data center.\n- **Grafana**: An analytics platform that lets you create insightful dashboards and explore your logging data. You can query logs stored in the logging platform using the Grafana user interface.\n\nConsiderations for your deployments\n-----------------------------------\n\nConsider the following aspects when using the logging platform to collect logs:\n\n- **Storage capacity**: Plan for sufficient storage capacity to accommodate the volume of log data your applications and system components generate.\n- **Log retention policies** : Define log retention times based on your compliance and operational needs during the creation of your organization. For more information, see [Log retention](#retention).\n\nBenefits\n--------\n\nYou obtain the following benefits when using the logging platform in\nGDC:\n\n- **Automation**: Automate log-related tasks, such as exporting logs to a central repository or generating reports.\n- **Customization**: Build custom logging solutions tailored to your needs and integrate them with existing tools and workflows.\n- **Efficiency**: Programmatically manage large volumes of log data and perform complex queries.\n- **Flexibility**: Access log data from various sources and integrate your systems with analysis and monitoring tools.\n\nBy using the logging platform in your air-gapped environment, you can manage and\nanalyze log data, even in an isolated environment.\n\nLog retention\n-------------\n\n| **Important:** Retention times are permanent and are configured when the organization is created. You cannot modify retention times after the organization's creation.\n\nRetention policies define how long metrics and logs are stored. These policies\nare crucial for meeting compliance requirements and supporting operational\nanalysis. GDC uses retention times to configure\nlifecycle and retention policies for resource configurations.\n\nIf specific retention times are not provided during the organization's creation\nor are set to `0` in the `Organization` custom resource during creation time,\nthe system applies the following default values for logs:\n\n- **Audit logs**: 15 days\n- **Operational logs**: 07 days\n\nFurther resources\n-----------------\n\nConsult the comprehensive list of\n[audit logs](/distributed-cloud/hosted/docs/latest/appliance/platform-application/pa-ao-operations/audit-logs-overview)\nand [operational logs](/distributed-cloud/hosted/docs/latest/appliance/platform-application/pa-ao-operations/operational-logs-overview)\nfor detailed descriptions of all collected logs from GDC\ncomponents. These resources provide valuable context and facilitate advanced\nlogging strategies."]]