<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Logging on ferkakta.dev</title><link>https://ferkakta.dev/tags/logging/</link><description>Recent content in Logging on ferkakta.dev</description><generator>Hugo</generator><language>en-US</language><copyright>Copyright fizz.</copyright><lastBuildDate>Mon, 02 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://ferkakta.dev/tags/logging/index.xml" rel="self" type="application/rss+xml"/><item><title>Per-Tenant CloudWatch Log Isolation on EKS, or: Why I Stopped Using aws-for-fluent-bit</title><link>https://ferkakta.dev/per-tenant-cloudwatch-log-isolation-eks/</link><pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate><guid>https://ferkakta.dev/per-tenant-cloudwatch-log-isolation-eks/</guid><description>&lt;h2 id="the-starting-assumption"&gt;The starting assumption&lt;/h2&gt;
&lt;p&gt;I&amp;rsquo;m building &lt;a href="https://ramparts.dev"&gt;ramparts&lt;/a&gt;, a multi-tenant compliance platform running on EKS. Each tenant gets a Kubernetes namespace &amp;ndash; &lt;code&gt;tenant-acme&lt;/code&gt;, &lt;code&gt;tenant-globex&lt;/code&gt;, whatever &amp;ndash; and the compliance controls require that their application logs land in isolated storage with 365-day retention. CMMC maps this to AU-2 (audit events), AU-3 (audit content), AU-11 (retention), and AC-4 (information flow isolation). A tenant cannot read another tenant&amp;rsquo;s container output.&lt;/p&gt;
&lt;p&gt;The obvious first move was &lt;code&gt;aws-for-fluent-bit&lt;/code&gt;, AWS&amp;rsquo;s own Helm chart and container image for shipping logs to CloudWatch. AWS service, AWS chart, AWS logging destination. The blessed path.&lt;/p&gt;</description></item><item><title>Why we removed aws-for-fluent-bit from EKS</title><link>https://ferkakta.dev/why-we-removed-aws-for-fluent-bit-from-eks/</link><pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate><guid>https://ferkakta.dev/why-we-removed-aws-for-fluent-bit-from-eks/</guid><description>&lt;p&gt;We deployed &lt;code&gt;aws-for-fluent-bit&lt;/code&gt; because AWS recommends it.&lt;/p&gt;
&lt;p&gt;If you follow the EKS logging documentation, that&amp;rsquo;s the default path. It assumes you use AWS&amp;rsquo;s distribution of Fluent Bit rather than the upstream Helm chart.&lt;/p&gt;
&lt;p&gt;We did.&lt;/p&gt;
&lt;p&gt;Two days later, we ripped it out.&lt;/p&gt;
&lt;p&gt;The AWS chart and the upstream chart are not the same thing. The differences aren&amp;rsquo;t cosmetic. They affect how quickly you receive security patches, how transparently your configuration maps to the underlying plugin, and how many boundaries sit between your logs and the CloudWatch API.&lt;/p&gt;</description></item></channel></rss>