Administration
Manage HAProxy Enterprise logs
Using HAProxy Fusion?
If you’re using HAProxy Fusion, then see the HAProxy Fusion - Logs topic instead.
HAProxy Enterprise generates two types of logs: access logs and administrative logs.
Enable access logs Jump to heading
Access logs, also called traffic logs, record information about client connections and requests. The logs are stored in the /var/log/hapee-<VERSION>
directory and have file names prefixed with lb-access-
plus a timestamp.
To enable access logs:
-
Add the following
log
directive in theglobal
section of the HAProxy Enterprise configuration file, if one does not already exist:haproxygloballog 127.0.0.1 local0haproxygloballog 127.0.0.1 local0This definition, which does not set a severity level for events, captures all events and tags them with the
local0
syslog facility code. An rsyslog configuration file at/etc/rsyslog.d/hapee-<VERSION>-lb.conf
routes these events to the access log file.You can change the IP address to send logs to a remote rsyslog server over UDP.
-
In your
frontend
ordefaults
section, add alog global
directive, which applies thelog
directive from theglobal
section to the frontend.haproxyfrontend fe_mainlog globalhaproxyfrontend fe_mainlog global
Enable administrative logs Jump to heading
Administrative logs record information about load balancer process events such as when the load balancer starts or stops. The logs are stored in the /var/log/hapee-<VERSION>
directory and have file names prefixed with lb-admin-
plus a timestamp.
To enable administrative logs:
-
Add the following
log
directive in theglobal
section of the HAProxy Enterprise configuration file, if one does not already exist:haproxygloballog 127.0.0.1 local1 noticehaproxygloballog 127.0.0.1 local1 noticeThis definition, which sets its severity level to
notice
, captures most log events but omits the more verbose traffic events captured by the access logs. It tags those events with the syslog facility codelocal1
. An rsyslog configuration file at/etc/rsyslog.d/hapee-<VERSION>-lb.conf
routes these events to the admin log file. Basically, they have the same contents as access logs but without theinfo
level details about connection and request events.You can change the IP address to send logs to a remote rsyslog server over UDP.
-
In your
frontend
ordefaults
section, add alog global
directive, which applies thelog
directive from theglobal
section to the frontend.haproxyfrontend fe_mainlog globalhaproxyfrontend fe_mainlog global
Enable log compression and rotation Jump to heading
Available since:
- HAProxy Enterprise 2.0r1
The hasavelog
utility, disabled by default, can automatically compress and delete old HAProxy Enterprise logs. The enabled, out-of-the-box defaults for the hasavelog
utility will:
- compress log files using the
gzip
compression method - operate in HAProxy Enterpise mode (enforces nocycle, nodate, notouch, nocreate, and noclean)
- create and write a new compressed log file daily into the directory
/var/log/hapee-<VERSION>
- operate in quiet mode
- keep all log files indefinitely unless specified
To enable the hasavelog
utility:
-
Open the
hasavelog
utility’s configuration file. Located at:nix/etc/default/hapee-<VERSION>-hasavelognix/etc/default/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelog -
The
HASAVELOG_ENABLE
field accepts either 1 (enabled) or 0 (disabled). SetHASAVELOG_ENABLE="1"
and save. -
Start the
hasavelog
service with:nixsudo systemctl start hapee-<VERSION>-hasavelognixsudo systemctl start hapee-<VERSION>-hasavelog
Tune the hasavelog
utility with additional arguments
Jump to heading
The HASAVELOG_ARGS
field tunes the hasavelog
utility. HASAVELOG_ARGS
has a default configuration of -e -r /var/log/hapee-<VERSION> -q
, where logs are stored in /var/log/hapee-<VERSION>
.
HASAVELOG_ARGS
can set the following arguments:
Argument | Description |
---|---|
-e |
Operate in HAProxy Enterprise mode (enforces nocycle, nodate, notouch, nocreate, and noclean). Default: Operates in HAProxy Enterprise mode |
-r <roll-directory-path> |
Sets the roll directory path to <roll-directory-path> instead of the current directory. The roll directory path is where compressed files get stored. Default: Rolls log files to /var/log/hapee-<VERSION> |
-q |
Operate in quiet mode. Default: Operates in quiet mode |
-l |
Do not compress log files. Default: Compress log files |
-x <path-to-shell-script> |
Invoke a shell script at <path-to-shell-script> after a successful log file compression. For example, create /hook/script.sh with a script to send notifications to IRC/Slack or send HUP to a syslogd. Default: null |
-s <integer> |
If a log file size is under |
-Z |
Compress with pigz using threads to make use of multiple processors and cores. Default: Compress with gzip |
To tune HASAVELOG_ARGS
:
-
Open the
hasavelog
utility’s configuration file. Located at:nix/etc/default/hapee-<VERSION>-hasavelognix/etc/default/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelog -
Change the
HASAVELOG_ARGS
field to include the arguments you want to set and save. For example:textHASAVELOG_ARGS="-e -r /var/log/hapee-@@HAPEE_MAJORVERSION@@ -q -Z -s 1"textHASAVELOG_ARGS="-e -r /var/log/hapee-@@HAPEE_MAJORVERSION@@ -q -Z -s 1"In addition to the out-of-the-box defaults, compresses log files over 1 MB in size with the
pigz
compression method. -
Restart the
hasavelog
service after any saved changes to thehasavelog
utility configuration file:nixsudo systemctl restart hapee-<VERSION>-hasavelognixsudo systemctl restart hapee-<VERSION>-hasavelog
Set the retention period for logs Jump to heading
The HASAVELOG_RETAIN
field sets the retention period. It keeps all log files indefinitely with the default value of an empty string (""
). Using an integer, set HASAVELOG_RETAIN
to delete logs older than that number of days.
-
Open the
hasavelog
utility’s configuration file. Located at:nix/etc/default/hapee-<VERSION>-hasavelognix/etc/default/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelog -
Change the value of
HASAVELOG_RETAIN
to the number of days you would like to keep log files for. For example, settingHASAVELOG_RETAIN="30"
will automatically continue to delete any logs older than 30 days. -
Restart the
hasavelog
service after any saved changes to thehasavelog
utility configuration file:nixsudo systemctl restart hapee-<VERSION>-hasavelognixsudo systemctl restart hapee-<VERSION>-hasavelog
Enable audit logging Jump to heading
The HASAVELOG_AUDIT
field, disabled by default, allows the hasavelog
utility to log file deletions for compliance. It’s printed to stdout. The HASAVELOG_AUDIT
field accepts either 1
(enabled) or 0
(disabled).
When the field is enabled, the hasavelog
utility offers more verbose logging:
-
Open the
hasavelog
utility’s configuration file. Located at:nix/etc/default/hapee-<VERSION>-hasavelognix/etc/default/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelognix/etc/sysconfig/hapee-<VERSION>-hasavelog -
The
HASAVELOG_AUDIT
field accepts either 1 (enabled) or 0 (disabled). SetHASAVELOG_AUDIT="1"
and save. -
Restart the
hasavelog
service after any changes to thehasavelog
utility configuration file:nixsudo systemctl restart hapee-<VERSION>-hasavelognixsudo systemctl restart hapee-<VERSION>-hasavelog
An example output with HASAVELOG_AUDIT="1"
and HASAVELOG_RETAIN="2"
:
nix
systemctl status hapee-<VERSION>-hasavelog.service
nix
systemctl status hapee-<VERSION>-hasavelog.service
outputtext
[...]Jul 22 14:34:27 hostname1 hasavelog[1569]: hasavelog: `find -delete -print' in /var/log/hapee-<VERSION>Jul 22 14:34:27 hostname1 hasavelog[1575]: hasavelog: /var/log/hapee-<VERSION>/lb-access-20240719.logJul 22 14:34:27 hostname1 hasavelog[1575]: hasavelog: /var/log/hapee-<VERSION>/lb-admin-20240719.logJul 22 14:34:27 hostname1 systemd[1]: hapee-<VERSION>-hasavelog.service: Succeeded.Jul 22 14:34:27 hostname1 systemd[1]: Finished Compress HAProxy Enterprise log files.
outputtext
[...]Jul 22 14:34:27 hostname1 hasavelog[1569]: hasavelog: `find -delete -print' in /var/log/hapee-<VERSION>Jul 22 14:34:27 hostname1 hasavelog[1575]: hasavelog: /var/log/hapee-<VERSION>/lb-access-20240719.logJul 22 14:34:27 hostname1 hasavelog[1575]: hasavelog: /var/log/hapee-<VERSION>/lb-admin-20240719.logJul 22 14:34:27 hostname1 systemd[1]: hapee-<VERSION>-hasavelog.service: Succeeded.Jul 22 14:34:27 hostname1 systemd[1]: Finished Compress HAProxy Enterprise log files.
The highlighted lines represent what you will see with audit loggging enabled. On July 22nd, the hasavelog
utility deleted the logs from July 19th because it is over 2 days old. It then printed the deletion events to stdout.
Set logging levels Jump to heading
Log levels are the same as the severity levels used by the syslog
service. Below, we set the level to notice
, which captures all events at that level and above (up to emerg
):
haproxy
globallog 127.0.0.1 local1 notice
haproxy
globallog 127.0.0.1 local1 notice
HAProxy Enterprise tags each loggable event with a severity level. For example, it categorizes log messages related to connections and HTTP requests with the info
severity level. Other events are categorized using one of the other, less verbose levels. From most to least verbose, the severity levels are:
Level | Events at this level |
---|---|
emerg | Errors such as running out of operating system file descriptors. |
alert | Some rare cases where something unexpected has happened, such as being unable to cache a response. |
crit | Not used. |
err | Errors such as being unable to parse a map file, being unable to parse the HAProxy configuration file, and when an operation on a stick table fails. |
warning | Certain important, but non-critical, errors such as failing to set a request header or failing to connect to a DNS nameserver. |
notice | Changes to a server’s state, such as being UP or DOWN or when a server is disabled. Other events at startup, such as starting proxies and loading modules, are also included. Health check logging, if enabled, also uses this level. |
info | TCP connection and HTTP request details and errors. |
debug | You may write custom Lua code that logs at this level. |
Set conditional log levels Jump to heading
Sometimes, you’ll want to capture a more verbose log entry for a particular request or response, such as when the server returned an error. To change the log level for individual requests or responses that match specified criteria, use one of these directives, depending on whether you’re targeting the request phase or response phase, and whether your’re in HTTP or TCP mode:
http-request set-log-level <level> [ { if | unless } <condition> ]
http-response set-log-level <level> [ { if | unless } <condition> ]
tcp-request content set-log-level <level> [ { if | unless } <condition> ]
tcp-response content set-log-level <level> [ { if | unless } <condition> ]
Using these directives, you can set the log level to any of the eight syslog levels or to the special level silent
, which disables logging for this request/response. This rule is not final so the last matching rule wins.
Specify a condition using the ACL syntax:
haproxy
frontend wwwbind :80acl failed_request status 400 401 403 404 405 408 429 500 503http-response set-log-level err if failed_request
haproxy
frontend wwwbind :80acl failed_request status 400 401 403 404 405 408 429 500 503http-response set-log-level err if failed_request
Log ASAP Jump to heading
By default, logs are emitted when the session terminates. That is, when all log values are finalized. Capturing some log values, such as total transfer time and message size, can delay generation of the log content, particularly for a large file transfer.
To avoid such delays, you can choose to log available values as quickly as possible by specifying the logasap
option. With this option, the load balancer creates the log message as soon as the server connection has been established in mode tcp
or as soon as the server sends the complete headers in mode http
.
Values not finalized at this time are total time and total size metrics, and they are prefixed with a plus sign “+
” in the log to indicate that they are not true, final values.
Enable early logging by adding option logasap
to the defaults
or frontend
section, as shown below. In this example, we also capture the Content-Length
header in the logs so that the logs at least indicate how many bytes are expected to be transferred.
haproxy
frontend fe_mainbind 0.0.0.0:80mode httplog globaloption httplogoption logasaphttp-request capture req.hdr(Content-Length) len 15
haproxy
frontend fe_mainbind 0.0.0.0:80mode httplog globaloption httplogoption logasaphttp-request capture req.hdr(Content-Length) len 15
outputtext
>>> Feb 6 12:14:14 localhost \hapee-lb[14389]: 10.0.1.2:33317 [06/Feb/2019:12:14:14.655] fe_main \static/srv1 9/10/7/14/+30 200 +243 - - ---- 3/1/1/1/0 1/0 \"GET /image.iso HTTP/1.0"
outputtext
>>> Feb 6 12:14:14 localhost \hapee-lb[14389]: 10.0.1.2:33317 [06/Feb/2019:12:14:14.655] fe_main \static/srv1 9/10/7/14/+30 200 +243 - - ---- 3/1/1/1/0 1/0 \"GET /image.iso HTTP/1.0"
Set the log format Jump to heading
By default, HAProxy Enterprise logs are sparse, capturing minimal information about each TCP connection in the access logs:
text
>>> Jan 27 21:15:06 localhost hapee-lb[2901]: Connect from 192.168.50.1:61459 to 192.168.50.25:80 \(fe_main/HTTP)
text
>>> Jan 27 21:15:06 localhost hapee-lb[2901]: Connect from 192.168.50.1:61459 to 192.168.50.25:80 \(fe_main/HTTP)
The information includes:
Field | Example value |
---|---|
the PID of the HAProxy Enterprise process | hapee-lb[2901] |
the text “Connect from” followed by the client’s source IP address and port | Connect from 192.168.50.1:61459 |
the text “to” followed by the destination IP address and port | to 192.168.50.25:80 |
the name of the frontend that received the request and the mode (e.g. HTTP) | (fe_main/HTTP) |
To get a more detailed log, use one of the directives describes in the following sections.
TCP log format Jump to heading
The option tcplog
directive is suitable for frontend
sections that either specify mode tcp
or don’t set mode
at all.
haproxy
defaultsmode tcpoption tcplog
haproxy
defaultsmode tcpoption tcplog
After reloading your configuration, you’ll see the following log format:
outputtext
>>> Jan 27 21:22:53 localhost hapee-lb[3042]: 192.168.50.1:61535 [27/Jan/2021:21:22:10.944] \fe_main be_servers/s1 1/0/42404 2895 cD 1/1/0/0/0 0/0
outputtext
>>> Jan 27 21:22:53 localhost hapee-lb[3042]: 192.168.50.1:61535 [27/Jan/2021:21:22:10.944] \fe_main be_servers/s1 1/0/42404 2895 cD 1/1/0/0/0 0/0
The information included is detailed in the TCP log format section of the reference guide.
The tcplog
log format is equivalent to the following log-format
definition, if you were to set it yourself:
haproxy
log-format "%ci:%cp [%t] %ft %b/%s %Tw/%Tc/%Tt %B %ts %ac/%fc/%bc/%sc/%rc %sq/%bq"
haproxy
log-format "%ci:%cp [%t] %ft %b/%s %Tw/%Tc/%Tt %B %ts %ac/%fc/%bc/%sc/%rc %sq/%bq"
HTTP log format Jump to heading
The option httplog
directive is suitable for frontend
sections that specify mode http
. This option provides the same information as the tcplog
option, but with additional HTTP details.
haproxy
defaultsmode httpoption httplog
haproxy
defaultsmode httpoption httplog
After reloading your configuration, you’ll see the following log format:
outputtext
>>> Jan 27 21:52:56 localhost hapee-lb[3098]: 192.168.50.1:61818 [27/Jan/2021:21:52:56.086] \fe_main be_servers/s1 0/0/1/1/2 200 517 - - ---- 1/1/0/0/0 0/0 {1wt.eu} {} "GET / HTTP/1.1"
outputtext
>>> Jan 27 21:52:56 localhost hapee-lb[3098]: 192.168.50.1:61818 [27/Jan/2021:21:52:56.086] \fe_main be_servers/s1 0/0/1/1/2 200 517 - - ---- 1/1/0/0/0 0/0 {1wt.eu} {} "GET / HTTP/1.1"
The information included is detailed in the HTTP log format section of the reference guide.
The httplog
log format is equivalent to the following log-format
definition, if you were to set it yourself:
haproxy
log-format "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r"
haproxy
log-format "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r"
CLF log format Jump to heading
If you intend to pass the HTTP log to a log analyzer that supports the CLF format, you can specify the optional clf
argument:
haproxy
defaultsmode httpoption httplog clf
haproxy
defaultsmode httpoption httplog clf
The CLF format provides the same details as the HTTP log format, but in the order required for CLF parsing. It is equivalent to the following log-format
definition:
haproxy
log-format "%{+Q}o %{-Q}ci - - [%trg] %r %ST %B \"\" \"\" %cp %ms %ft %b %s %TR %Tw %Tc %Tr %Ta %tsc %ac %fc %bc %sc %rc %sq %bq %CC %CS %hrl %hsl"
haproxy
log-format "%{+Q}o %{-Q}ci - - [%trg] %r %ST %B \"\" \"\" %cp %ms %ft %b %s %TR %Tw %Tc %Tr %Ta %tsc %ac %fc %bc %sc %rc %sq %bq %CC %CS %hrl %hsl"
HTTPS log format Jump to heading
Available since
- HAProxy Enterprise 2.5r1
The option httpslog
directive is suitable for HTTP over TLS connections. This option provides the same information as the option httplog
directive, but with additional TLS details.
haproxy
defaultsmode httpoption httpslog
haproxy
defaultsmode httpoption httpslog
After reloading your configuration, you’ll see the following log format:
outputtext
>>> Feb 6 12:14:14 localhost hapee-lb[3098]: 192.168.50.1:61818 [27/Jan/2021:21:52:56.086] \fe_main be_servers/s1 0/0/1/1/2 200 517 - - ---- 1/1/0/0/0 0/0 {1wt.eu} {} \"GET / HTTP/1.1" 0/0/0/0/0 1wt.eu/TLSv1.3/TLS_AES_256_GCM_SHA384
outputtext
>>> Feb 6 12:14:14 localhost hapee-lb[3098]: 192.168.50.1:61818 [27/Jan/2021:21:52:56.086] \fe_main be_servers/s1 0/0/1/1/2 200 517 - - ---- 1/1/0/0/0 0/0 {1wt.eu} {} \"GET / HTTP/1.1" 0/0/0/0/0 1wt.eu/TLSv1.3/TLS_AES_256_GCM_SHA384
The information included is detailed in the HTTPS log format section of the reference guide.
The httpslog
log format is equivalent to the following log-format
definition:
haproxy
log-format "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r %[fc_err]/%[ssl_fc_err,hex]/%[ssl_c_err]/%[ssl_c_ca_err]/%[ssl_fc_is_resumed] %[ssl_fc_sni]/%sslv/%sslc"
haproxy
log-format "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r %[fc_err]/%[ssl_fc_err,hex]/%[ssl_c_err]/%[ssl_c_ca_err]/%[ssl_fc_is_resumed] %[ssl_fc_sni]/%sslv/%sslc"
Custom log format Jump to heading
You can define your own log format and record a custom set of information about connections or HTTP requests. Your log format can include variables and values from fetch methods.
Use the log-format
directive to create a new log format in your defaults
or frontend
section. It specifies a string that contains variables referring to the fields that you’d like to capture.
Often, you will want to keep the existing information collected by the premade log format rules and append new information to them. From version 2.7r1 onward, to make that easier, you can use one of the following environment variables:
HAPROXY_TCP_LOG_FMT
HAPROXY_HTTP_LOG_FMT
HAPROXY_HTTPS_LOG_FMT
In versions prior to 2.7r1, define the environment variables yourself:
haproxy
globalsetenv HAPROXY_TCP_LOG_FMT "%ci:%cp [%t] %ft %b/%s %Tw/%Tc/%Tt %B %ts %ac/%fc/%bc/%sc/%rc %sq/%bq"setenv HAPROXY_HTTP_LOG_FMT "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r"setenv HAPROXY_HTTPS_LOG_FMT "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r %[fc_err]/%[ssl_fc_err,hex]/%[ssl_c_err]/%[ssl_c_ca_err]/%[ssl_fc_is_resumed] %[ssl_fc_sni]/%sslv/%sslc"
haproxy
globalsetenv HAPROXY_TCP_LOG_FMT "%ci:%cp [%t] %ft %b/%s %Tw/%Tc/%Tt %B %ts %ac/%fc/%bc/%sc/%rc %sq/%bq"setenv HAPROXY_HTTP_LOG_FMT "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r"setenv HAPROXY_HTTPS_LOG_FMT "%ci:%cp [%tr] %ft %b/%s %TR/%Tw/%Tc/%Tr/%Ta %ST %B %CC %CS %tsc %ac/%fc/%bc/%sc/%rc %sq/%bq %hr %hs %{+Q}r %[fc_err]/%[ssl_fc_err,hex]/%[ssl_c_err]/%[ssl_c_ca_err]/%[ssl_fc_is_resumed] %[ssl_fc_sni]/%sslv/%sslc"
Reference the environment variable in your log-format
line. Below, we start with the HTTP log format and then append a variable named txn.myvariable
to the end of the original HTTP log format:
haproxy
defaultslog-format "$HAPROXY_HTTP_LOG_FMT %[var(txn.myvariable)]"
haproxy
defaultslog-format "$HAPROXY_HTTP_LOG_FMT %[var(txn.myvariable)]"
A log format variable is a string prefixed by the character %
. You can use them to create custom log formats. A common way to use this is to record a variable in the logs by using the var
fetch method as shown below:
haproxy
frontend fe_mainbind :80# store the 'path' in a variable named 'txn.mypath'http-request set-var(txn.mypath) path# logs will show the path valuelog-format "$HAPROXY_HTTP_LOG_FMT %[var(txn.mypath)]"
haproxy
frontend fe_mainbind :80# store the 'path' in a variable named 'txn.mypath'http-request set-var(txn.mypath) path# logs will show the path valuelog-format "$HAPROXY_HTTP_LOG_FMT %[var(txn.mypath)]"
Avoid spaces in the variable name. A space is considered a separator. If a variable is between square brackets ([
… ]
), then it can be an expression, such as to call a fetch method to get a value. Below, we get the value from the res.cache_hit
fetch method, which indicates whether the load balancer’s cache was hit:
haproxy
frontend fe_mainlog-format "$HAPROXY_HTTP_LOG_FMT %[res.cache_hit]"
haproxy
frontend fe_mainlog-format "$HAPROXY_HTTP_LOG_FMT %[res.cache_hit]"
HTTP response variables, those with a res.
prefix, are easy because they’re certain to be available. However, variables set during the request phase are not available to the log-format
directive, which executes during the response phase. To use them, you must store them in a transaction-level variable, as shown below:
haproxy
frontend fe_mainhttp-request set-var(txn.host) req.hdr(Host)log-format "$HAPROXY_HTTP_LOG_FMT %[var(txn.host)]"
haproxy
frontend fe_mainhttp-request set-var(txn.host) req.hdr(Host)log-format "$HAPROXY_HTTP_LOG_FMT %[var(txn.host)]"
You can prefix a variable with a plus or minus sign and a flag. A plus adds the flag, while a minus removes it. There are three flags available:
Q
: adds double quotes around the valueX
: represents the value as hexadecimalE
: escapes characters with a backslash, such as double quotes and backslashes
In the example below, we add double quotes around the Host
header value:
haproxy
frontend fe_mainhttp-request set-var(txn.host) req.hdr(Host)log-format "$HAPROXY_HTTP_LOG_FMT %{+Q}[var(txn.host)]"
haproxy
frontend fe_mainhttp-request set-var(txn.host) req.hdr(Host)log-format "$HAPROXY_HTTP_LOG_FMT %{+Q}[var(txn.host)]"
Use the special variable %o
to propagate its flags to all following variables in the same format string.
To emit a verbatim %
, it must be preceded by another %
to result in %%
. HAProxy Enterprise automatically merges consecutive separators.
Log to JSON Jump to heading
Available since
- HAProxy Enterprise 3.0r1
To define a custom log format that returns a JSON-formatted string:
- Prefix your
log-format
string with%{+json}o
. - Prefix each field with a key surrounded by parentheses.
Example:
haproxy
frontend mysitebind :80log-format "%{+json}o %(client_ip)ci %(client_port)cp %(request_date)tr %(frontend_name)ft %(backend_name)b %(server_name)s %(time_to_receive)TR %(time_waiting)Tw %(time_to_connect)Tc %(time_server_response)Tr %(time_active)Ta %(status_code)ST %(bytes_read)B %(request_cookies)CC %(response_cookies)CS %(termination_state)tsc %(process_active_connections)ac %(frontend_active_connections)fc %(backend_active_connections)bc %(server_active_connections)sc %(retries)rc %(server_queue)sq %(backend_queue)bq %(request_headers)hr %(response_headers)hs %(request_line)r"use_backend webservers
haproxy
frontend mysitebind :80log-format "%{+json}o %(client_ip)ci %(client_port)cp %(request_date)tr %(frontend_name)ft %(backend_name)b %(server_name)s %(time_to_receive)TR %(time_waiting)Tw %(time_to_connect)Tc %(time_server_response)Tr %(time_active)Ta %(status_code)ST %(bytes_read)B %(request_cookies)CC %(response_cookies)CS %(termination_state)tsc %(process_active_connections)ac %(frontend_active_connections)fc %(backend_active_connections)bc %(server_active_connections)sc %(retries)rc %(server_queue)sq %(backend_queue)bq %(request_headers)hr %(response_headers)hs %(request_line)r"use_backend webservers
Entries in the log will look like this:
json
{"client_ip": "172.21.0.1", "client_port": 57526, "request_date": "05/Jun/2024:20:59:57.698", "frontend_name": "mysite", "backend_name": "webservers", "server_name": "web1", "time_to_receive": 0, "time_waiting": 0, "time_to_connect": 0, "time_server_response": 0, "time_active": 0, "status_code": 200, "bytes_read": 993, "request_cookies": "", "response_cookies": "", "termination_state": "----", "process_active_connections": 1, "frontend_active_connections": 1, "backend_active_connections": 0, "server_active_connections": 0, "retries": 0, "server_queue": 0, "backend_queue": 0, "request_headers": null, "response_headers": null, "request_line": "GET / HTTP/1.1"}
json
{"client_ip": "172.21.0.1", "client_port": 57526, "request_date": "05/Jun/2024:20:59:57.698", "frontend_name": "mysite", "backend_name": "webservers", "server_name": "web1", "time_to_receive": 0, "time_waiting": 0, "time_to_connect": 0, "time_server_response": 0, "time_active": 0, "status_code": 200, "bytes_read": 993, "request_cookies": "", "response_cookies": "", "termination_state": "----", "process_active_connections": 1, "frontend_active_connections": 1, "backend_active_connections": 0, "server_active_connections": 0, "retries": 0, "server_queue": 0, "backend_queue": 0, "request_headers": null, "response_headers": null, "request_line": "GET / HTTP/1.1"}
Log to CBOR Jump to heading
Available since
- HAProxy Enterprise 3.0r1
To define a custom log format that returns a CBOR-formatted string:
- Prefix your
log-format
string with%{+cbor}o
. - Prefix each field with a key surrounded by parentheses.
Example:
haproxy
frontend mysitebind :80log-format "%{+cbor}o %(client_ip)ci %(client_port)cp %(request_date)tr %(frontend_name)ft %(backend_name)b %(server_name)s %(time_to_receive)TR %(time_waiting)Tw %(time_to_connect)Tc %(time_server_response)Tr %(time_active)Ta %(status_code)ST %(bytes_read)B %(request_cookies)CC %(response_cookies)CS %(termination_state)tsc %(process_active_connections)ac %(frontend_active_connections)fc %(backend_active_connections)bc %(server_active_connections)sc %(retries)rc %(server_queue)sq %(backend_queue)bq %(request_headers)hr %(response_headers)hs %(request_line)r"use_backend webservers
haproxy
frontend mysitebind :80log-format "%{+cbor}o %(client_ip)ci %(client_port)cp %(request_date)tr %(frontend_name)ft %(backend_name)b %(server_name)s %(time_to_receive)TR %(time_waiting)Tw %(time_to_connect)Tc %(time_server_response)Tr %(time_active)Ta %(status_code)ST %(bytes_read)B %(request_cookies)CC %(response_cookies)CS %(termination_state)tsc %(process_active_connections)ac %(frontend_active_connections)fc %(backend_active_connections)bc %(server_active_connections)sc %(retries)rc %(server_queue)sq %(backend_queue)bq %(request_headers)hr %(response_headers)hs %(request_line)r"use_backend webservers
Entries in the log will look like this (line breaks added for clarity):
text
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
text
BF69636C69656E745F69706A3137322E32312E302E316B636C69656E745F706F727419E0306C726571756573745F64617465781830352F4A756E2F323032343A32313A30323A33392E3334346D66726F6E74656E645F6E616D657F666D7973697465FF6C6261636B656E645F6E616D656A776562736572766572736B7365727665725F6E616D6564776562316F74696D655F746F5F72656365697665006C74696D655F77616974696E67006F74696D655F746F5F636F6E6E656374007474696D655F7365727665725F726573706F6E7365006B74696D655F616374697665006B7374617475735F636F646518C86A62797465735F726561641903E16F726571756573745F636F6F6B696573F670726573706F6E73655F636F6F6B696573F6717465726D696E6174696F6E5F7374617465642D2D2D2D781A70726F636573735F6163746976655F636F6E6E656374696F6E7301781B66726F6E74656E645F6163746976655F636F6E6E656374696F6E7301781A6261636B656E645F6163746976655F636F6E6E656374696F6E730078197365727665725F6163746976655F636F6E6E656374696F6E73006772657472696573006C7365727665725F7175657565006D6261636B656E645F7175657565006F726571756573745F68656164657273F670726573706F6E73655F68656164657273F66C726571756573745F6C696E657
Log with Docker Jump to heading
When HAProxy Enterprise runs as a Docker container, you can collect logs in the following ways:
- Forward logs to standard out, allowing you to capture them using a log aggregation tool.
- Forward logs to a remote Syslog server, which can run in a separate container.
Log to standard out Jump to heading
This method publishes logs to standard out, allowing you to offload the collection of logs to an external tool, such as logspout.
-
Place a
log
directive into theglobal
section of your configuration file:- use
stdout
as the address - use
format raw
for a shortened log format compatible with a variety of tools - use
local0
as the facility code
haproxygloballog stdout format raw local0haproxygloballog stdout format raw local0 - use
-
Add a
log global
directive to adefaults
section to enable the global logging rule in all subsequentlisten
,frontend
, andbackend
sections:haproxydefaultslog globalhaproxydefaultslog global -
View logs by querying the HAProxy Enterprise container using the
docker logs
command:nixsudo docker logs hapeenixsudo docker logs hapee
Log to a syslog container Jump to heading
This method allows you to forward logs to a container running a Syslog server, such as Rsyslog.
-
Place a
log
directive into theglobal
section of your configuration file:- use the IP address or name of your Syslog container, with an optional port number
- use
local0
as the facility code
haproxygloballog rsyslog:514 local0haproxygloballog rsyslog:514 local0 -
Add a
log global
directive to adefaults
section to enable the global logging rule in all subsequentlisten
,frontend
, andbackend
sections:haproxydefaultslog globalhaproxydefaultslog globalThe full configuration might look like this:
haproxygloballog rsyslog:514 local0defaultslog globalfrontend fe_mainbind :80default_backend be_mainbackend be_mainserver web1 web1:8080 checkhaproxygloballog rsyslog:514 local0defaultslog globalfrontend fe_mainbind :80default_backend be_mainbackend be_mainserver web1 web1:8080 check -
Launch containers:
- Create the Docker network:
nixsudo docker network create -d bridge my-networknixsudo docker network create -d bridge my-network- Run the web server container:
nixsudo docker run -d --network my-network --name web1 \--restart unless-stopped jmalloc/echo-servernixsudo docker run -d --network my-network --name web1 \--restart unless-stopped jmalloc/echo-server- Run the Rsyslog container:
nixsudo docker run -d --network my-network --name rsyslog \--restart unless-stopped jumanjiman/rsyslognixsudo docker run -d --network my-network --name rsyslog \--restart unless-stopped jumanjiman/rsyslog- Run the HAProxy Enterprise container:
nixsudo docker run -d --network my-network --name hapee \-p 80:80 -p 443:443 -p 5555:5555 --restart unless-stopped \-v (pwd):/etc/hapee-3.0 \hapee-registry.haproxy.com/haproxy-enterprise:3.0r1nixsudo docker run -d --network my-network --name hapee \-p 80:80 -p 443:443 -p 5555:5555 --restart unless-stopped \-v (pwd):/etc/hapee-3.0 \hapee-registry.haproxy.com/haproxy-enterprise:3.0r1 -
View logs by querying the rsyslog container using the
docker logs
command:nixsudo docker logs rsyslognixsudo docker logs rsyslog
See also Jump to heading
Do you have any suggestions on how we can improve the content of this page?