If your applications use Log Service, make sure that application logs are collected to Log Service as expected from the related cluster of Container Service for Kubernetes (ACK) during the migration. You must also check whether services that are based on Log Service run as expected, such as Cloud Monitor.

  1. Log on to the Log Service console. In the Projects section, find and click the Log Service project that is used.
  2. On the Logstores tab, you can view the Logstores that are generated for the Swarm and ACK clusters.
Note The ACK cluster is configured to use the Log Service project that is used by the Swarm cluster when the ACK cluster is created. Kompose is also used to automatically migrate the log configurations. However, the Logstores for the Swarm cluster and the related ACK cluster are generated based on different rules. Therefore, application events of the related ACK cluster are logged in different Logstores under the same Log Service project.
  • The names of Logstores for the Swarm cluster are automatically generated in the format of acslog-${app}-${name}.
  • The names of Logstores for the ACK cluster are automatically generated in the format of ${name}. Each Logstore for the ACK cluster corresponds to a Logstore for the Swarm cluster.
  • In Kubernetes, Logstore names cannot contain uppercase letters. Therefore, Kompose automatically converts uppercase letters to lowercase letters during the migration.
You must also migrate log configurations or switch Logstores for other Alibaba Cloud services that collect application events to the Log Service project of the Swarm cluster. The following list provides the Alibaba Cloud services that require configurations migration or conversion. For more information about how to convert and modify configurations related to logging, see Log Service - Real-time consumption.
  • Real-time consumption: You can consume logs in real time by using the Log Service SDK, Storm Spout, Spark Streaming client, web console, and services such as Cloud Monitor and Application Real-Time Monitoring Service (ARMS).
  • Real-time query: You can query and analyze logs in real time.
  • Shipping and storage: You can deliver logs to various storage systems for processing.
  • Secure log service: Log Service connects to cloud security services and uses an independent software vendor (ISV) to consume logs of cloud services.