Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Save logs to a file #63

Closed
dani-garcia opened this issue Jul 8, 2018 · 6 comments
Closed

Save logs to a file #63

dani-garcia opened this issue Jul 8, 2018 · 6 comments
Labels
enhancement New feature or request

Comments

@dani-garcia
Copy link
Owner

From #58:

it would be nice to have the logs sent to a file rather than the console, that would make it easier to debug and also allow people to use a logging system like ELK to potentially track metrics.

The current logging is due to the web framework we use, Rocket. At the moment Rocket doen't support configuring the logging, but I know it's in the roadmap for future versions.

@mprasil mprasil added the enhancement New feature or request label Jul 9, 2018
@ptman
Copy link

ptman commented Aug 2, 2018

Some ways to achieve this are: run under systemd so that output is captured by journal or pipe to logger:

./bitwarden_rs 2>&1| logger -s -t bitwarden

@campZero
Copy link

campZero commented Aug 5, 2018

I run the container under unRAID, how could I implement this or is this to be done from "outside" of the container ?

@mprasil
Copy link
Contributor

mprasil commented Aug 5, 2018

Docker container logs to stdout, so docker daemon should be able to capture those. Not sure if unraid has some interface to capture and show those logs?

@ptman
Copy link

ptman commented Aug 5, 2018

@campZero take a look at the --log-driver option to docker run

@campZero
Copy link

campZero commented Aug 5, 2018

@mprasil: Well the docker.log file stays empty, unraid can show the log of bitwarden, but in this log there is no evidence of an unseccessful login attempt, it's just all kinds of GET this and POST that, so fail2ban could not capture possible bruteforce attempts (which in my case is what I'm trying to achieve.)

@ptman: it's run under unRAID, I don't manually start these containers and I am not sure how to pass the parameter in the template. Anyway, it seems these logs do not contain what I need, anyway.

I would need a file that I could expose to the letsencrypt container which houses the fail2ban for the reverse proxy, so the file would need to be on the unRAID or in the /data folder of bitwarden, but looking at the docker container layout is ancient greek in reverse to me, sadly.

@dani-garcia
Copy link
Owner Author

To keep the issue tracker more focused, I'm closing this issue in favor of the meta issue at #246.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants