APC audit logging configuration reference
This document lists every Helm value that controls the Astro Private Cloud (APC) audit logging sidecar and its sinks. For task-oriented instructions, see Set up audit log shipping.
All values in this document live under houston.logging.loggingSidecar in the astronomer chart’s values file. When you use the umbrella chart, prefix the path with astronomer., so the full path becomes astronomer.houston.logging.loggingSidecar.*.
Sidecar-level values
These values control the Vector sidecar itself, independent of which sink you enable.
The Vector sidecar ships with a secure-by-default security context. The chart already applies securityContext.runAsNonRoot: true and securityContext.allowPrivilegeEscalation: false, so most installations don’t need to set these values.
The Vector image is controlled at the chart level, not on the sidecar, through images.vector.repository and images.vector.tag. These values are managed by the chart and change between chart releases, so they aren’t pinned in this reference. For the current defaults, see the astronomer/astronomer chart values file.
CloudWatch sink values
Set under houston.logging.loggingSidecar.cloudwatch. Use this sink on Amazon EKS.
GCP Cloud Logging sink values
Set under houston.logging.loggingSidecar.gcpCloudLogging. Use this sink on Google Kubernetes Engine (GKE).
projectId, resource.location, and resource.clusterName are required when gcpCloudLogging.enabled is true. Empty or whitespace-only values are rejected by the chart.
Elasticsearch sink values
Set under houston.logging.loggingSidecar.elasticsearch. Use this sink to ship events to an external Elasticsearch cluster. The Elasticsearch sink is supported when the Astro Private Cloud control plane runs on Amazon EKS, GKE, or AKS.
auth.strategy and tls.enabled are independent. The chart supports all four combinations: none, basic, none with a custom CA, and basic with a custom CA.
APC service account annotations
The IRSA and Workload Identity integration points are annotations on the <release>-houston-bootstrapper service account. The chart passes any key-value pairs you set on houston.serviceAccount.annotations through to the rendered ServiceAccount manifest.
Both the APC API and APC Worker Pods use the same <release>-houston-bootstrapper service account, so a single annotation applies to both deployments.
Validation rules
The chart validates houston.logging.loggingSidecar at render time. The following rules fail helm upgrade with a descriptive error when violated:
- When
loggingSidecar.enabledistrue, exactly one ofcloudwatch.enabled,gcpCloudLogging.enabled, orelasticsearch.enabledmust also betrue. - When
gcpCloudLogging.enabledistrue,projectId,resource.location, andresource.clusterNamemust each be set to a non-whitespace value. - When
elasticsearch.enabledistrue,endpointmust be set.
Unsupported values
extraSinks on houston.logging.loggingSidecar isn’t accepted by the chart. APC audit logging ships only to the three sinks documented on this page.
Next steps
- To apply these values to an installation, see Set up audit log shipping.
- For the shape of each audit event and the list of audited operations, see Audit log schema and operations.