If your applications use Log Service to manage logs, make sure that logs are normally generated for the Kubernetes cluster and that services based on Log Service, such as CloudMonitor, work properly.

  1. Log on to the Log Service console. On the homepage, click the name of the target project.
  2. In the left-side navigation pane, click Logstores. In the Logstore list, you can view the Logstores generated for the Swarm and Kubernetes clusters.
Note You have configured the Kubernetes cluster to reuse the Log Service project of the existing Swarm cluster when creating the Kubernetes cluster. You have used Kompose to automatically migrate log configurations from Swarm to Kubernetes. However, Swarm and Kubernetes use different rules for generating Logstores, so the Logstores for Swarm and Kubernetes have a one-to-one mapping but with different names.
  • Logstores marked with 3 in the preceding figure are generated for the Swarm cluster and their names are in the format of acslog-${app}-${name}.
  • Logstores marked with 4 in the preceding figure are generated for the Kubernetes cluster and their names are in the format of ${name}.
  • In Kubernetes, Logstore names cannot contain uppercase letters. Therefore, Kompose automatically changes uppercase letters to lowercase letters when converting the log configurations.
You must also migrate log configurations or switch Logstores for other Alibaba Cloud services that collect application logs from the Log Service project of the Swarm cluster. Currently, application logs are used for the following purposes. For more information about how to migrate log configurations or switch Logstores for other Alibaba Cloud services, see Real-time subscription and consumption in the Log Service documentation.
  • Real-time consumption: You can consume logs in real time by using Log Service SDKs, Storm Spout, Spark Streaming client, Web consoles, and services such as CloudMonitor and Application Real-Time Monitoring Service (ARMS).
  • Real-time query: You can query and analyze logs in real time.
  • Shipping and storage: You can deliver logs to various storage systems for processing.
  • Secure log service: Log Service interfaces with cloud security services. The logs of cloud services can be consumed through independent software vendors (ISVs).