--- title: "Configuring control plane logs" sidebar_position: 30 --- Enabling EKS control plane logs is done on a per-cluster basis through the EKS API. This will often be configured using Terraform or CloudFormation, but in this lab we'll use the AWS CLI to enable the functionality: ```bash $ aws eks update-cluster-config \ --region $AWS_REGION \ --name $EKS_CLUSTER_NAME \ --logging '{"clusterLogging":[{"types":["api","audit","authenticator","controllerManager","scheduler"],"enabled":true}]}' { "update": { "id": "6d73515c-f5e7-4288-9e55-480e9c6dd084", "status": "InProgress", "type": "LoggingUpdate", "params": [ { "type": "ClusterLogging", "value": "{\"clusterLogging\":[{\"types\":[\"api\",\"audit\",\"authenticator\",\"controllerManager\",\"scheduler\"],\"enabled\":true}]}" } ], "createdAt": "2023-05-25T19:33:16.622000+00:00", "errors": [] } } $ aws eks wait cluster-active --name $EKS_CLUSTER_NAME ``` As you can see we can enable each of the cluster log types individually, and in this lab we're enabling everything. Let's take a look this configuration in the EKS console: https://console.aws.amazon.com/eks/home#/clusters/eks-workshop?selectedTab=cluster-logging-tab The **Logging** tab shows the current configuration for control plane logs for the cluster: ![EKS Console Logging Tab](./assets/logging-cluster-logging-tab.png) You can alter the logging configuration by clicking the **Manage** button: ![Enable Logging](./assets/logging-cluster-enable-logging.png)