Getting started with Loki during our test phase
The Platon team has been working over the past few months to establish a new logging service for Sikt, replacing the current solution, Humio, which will be phased out by the end of the year.
Rollout Phases
Phase 1: Shipping logs from services on the PaaS cluster, and selected external services currently using Humio.
Phase 2: Introduce metrics and tracing via OpenTelemetry for teams interested in adopting those capabilities.
We are currently in a testing phase with volunteer teams piloting the Loki/Grafana stack. Some processes are manual for now but will be automated as we learn more.
Getting Started with Loki and Grafana
For applications/services running on the PaaS cluster to start collecting logs:
-
Identify the correct namespace for your application/service.
-
Notify the Platon team (#platon) about the namespace. We also need:
- A name for the tenant/team to assign to the tenant
- A Microsoft group (EntraID group) that defines who should have access, so that Grafana and AuthProxy can be configured
-
The Platon team will update Vector to route logs based on namespace.
-
Loki will be configured with tenant separation to support multi-tenancy
Best Practice: Use one Tenant ID per product/service to ensure clear log ownership, cost tracking, and access control.
Accessing Your Logs
🔗 Access your logs at: https://grafana.platon.sikt.no
- You can access the logs in Grafana using Entra ID authentication
- In Grafana, Organizations correspond to product areas in Sikt
Role-Based Access Control
When Grafana is configured with Entra ID for authentication, you can manage user permissions using role-based group assignments. These groups can be created by team-admin.
About Role Groups in Sikt
Role groups in Sikt represent specific roles that outline both responsibilities and needs related to an employee's work. Each role group should have a clear description that defines the scope and meaning of the role.
Key principles:
- Role groups are designed to remain independent of specific systems and access rights
- When establishing access control in different systems, role groups should be used to assign access based on roles rather than to individual users
- Each role group is owned by a product area or section, which is responsible for defining the role and determining its membership
- A role group may include individuals from across the entire organization
Examples of Role-Based Groups in Platon
Group Name | EntraID Description |
---|---|
ROLE_Platon Ops | Full operational access for infrastructure management |
ROLE_Platon Shared Resources Insight | Read-only access to ingress logs and shared data. No write access |
For Services Not Running on PaaS
If your application is not running on the PaaS cluster, please contact the Platon team (#platon) for setup and guidance.
Query Performance
For best practices on writing efficient LogQL queries and optimizing performance, see our comprehensive LogQL Best Practices Guide.