How to skip logging of /ping requests

What happened?

The logs are full of authorize check entries from the upstream load balancer making /ping requests.

There are so many of these log entries that they overwhelm the number of non-ping authorize check logs and make the logs completely unusable without filtering them out using grep.

What did you expect to happen?

I expected /ping requests to be handled without emitting any log entries.

What’s your environment like?

Official pomerium docker image from docker hub running, on a Google Cloud managed instance group. Multiple all-in-one instances with postgres storage.

Pomerium is behind an Google Cloud HTTP(s) load balancer so that we can have its WAF and cloud shield functionality in front of Pomerium, but we would have the same volume of ping requests even if we used a layer 4 load balancer.

The exact container/version is:

"org.opencontainers.image.created": "2024-11-11T19:58:47Z",
"org.opencontainers.image.name": "pomerium",
"org.opencontainers.image.revision": "3e51b4f90521792cc151bfcf01ead86affdb06f7",
"org.opencontainers.image.source": "https://github.com/pomerium/pomerium",
"org.opencontainers.image.version": "0.28.0",

What’s your config.yaml?

"address": ":443"
"authenticate_service_url": "https://REDACTED"
"routes":
- OMITTED
CERTIFICATE_FILE=/run/secrets/cert.pem
CERTIFICATE_KEY_FILE=/run/secrets/key.pem
COOKIE_SECRET=REDACTED
DATABROKER_STORAGE_CONNECTION_STRING=REDACTED
DATABROKER_STORAGE_TYPE=postgres
IDP_CLIENT_ID=REDACTED
IDP_CLIENT_SECRET=REDACTED
IDP_PROVIDER=REDACTED
IDP_PROVIDER_URL=REDACTED
SHARED_SECRET=REDACTED
SIGNING_KEY=REDACTED

What did you see in the logs?

{"level":"info","config_file_source":"/pomerium/config.yaml","bootstrap":true,"server_name":"all","service":"authorize","request-id":"c860930e-aed0-4cb8-9ce9-63e75333db59","check-request-id":"c860930e-aed0-4cb8-9ce9-63e75333db59","method":"GET","path":"/ping","host":"pomerium","ip":"35.191.206.18","user":"","email":"","allow":true,"allow-why-true":["pomerium-route"],"deny":false,"deny-why-false":[],"time":"2025-02-20T17:26:05Z","message":"authorize check"}
{"level":"info","config_file_source":"/pomerium/config.yaml","bootstrap":true,"server_name":"all","service":"authorize","request-id":"c7023ccc-2fa1-417e-8b42-a0cf99349f12","check-request-id":"c7023ccc-2fa1-417e-8b42-a0cf99349f12","method":"GET","path":"/ping","host":"pomerium","ip":"35.191.206.19","user":"","email":"","allow":true,"allow-why-true":["pomerium-route"],"deny":false,"deny-why-false":[],"time":"2025-02-20T17:26:05Z","message":"authorize check"}
{"level":"info","config_file_source":"/pomerium/config.yaml","bootstrap":true,"server_name":"all","service":"authorize","request-id":"0c168ee0-343e-439a-be43-3c456d1d3fad","check-request-id":"0c168ee0-343e-439a-be43-3c456d1d3fad","method":"GET","path":"/ping","host":"pomerium","ip":"35.191.206.16","user":"","email":"","allow":true,"allow-why-true":["pomerium-route"],"deny":false,"deny-why-false":[],"time":"2025-02-20T17:26:06Z","message":"authorize check"}

Additional context

This is running inside google’s Container-Optimized OS.

It would be a high maintenance burden to take control over the config of the built-in fluentbit that forwards docker container logs to Google Cloud Logging, so in order to avoid having our Google Cloud Logging ingest all these useless log entries, we need to prevent the authorize service from emitting them in the first place.

I don’t want to turn off authorize check logging entirely, I still want a log of every request authorization except for /ping to the pomerium hostname from the load balancer and managed instance group health check.

Hi @rn-erik,

Thanks for the issue report. Pomerium does not currently have configuration settings for selectively emitting authorize service logs.

However, I wonder if this is something that could be handled directly within Google Cloud Logging. Have you looked into the documentation on Log Router? In particular the exclusion filter looks like it might be relevant for this use case.

Please let us know if that appears feasible.

Thanks,
Ken