File tree 2 files changed +37
-0
lines changed 2 files changed +37
-0
lines changed Original file line number Diff line number Diff line change @@ -136,6 +136,19 @@ $ oadm policy add-cluster-role-to-user cluster-reader \
136
136
this service account.
137
137
====
138
138
139
+ . Enable the Elasticsearch service account to get cluster role bindings so that
140
+ it can verify the roles that a user belongs to for allowing access to operations
141
+ logs:
142
+ +
143
+ ====
144
+ ----
145
+ $ oadm policy add-cluster-role-to-user rolebinding-reader \
146
+ system:serviceaccount:logging:aggregated-logging-elasticsearch <1>
147
+ ----
148
+ <1> Use the project you created earlier (for example, *logging*) when specifying
149
+ this service account.
150
+ ====
151
+
139
152
[[aggregate-logging-specifying-deployer-parameters]]
140
153
== Specifying Deployer Parameters
141
154
@@ -671,6 +684,21 @@ each new one to deploy it:
671
684
$ oc scale --replicas=1 dc/logging-es-<suffix>
672
685
----
673
686
687
+ [[cluster-reader-operations]]
688
+ *Allowing cluster-reader to view operations logs*
689
+
690
+ By default, only cluster-admins are granted access in Elasticsearch and Kibana
691
+ to view operations logs. To allow cluster-readers to also be able to view these
692
+ logs, update the value of `openshift.operations.allow_cluster_reader` in the
693
+ Elasticsearch configmap to be `true`:
694
+
695
+ ----
696
+ $ oc edit configmap/logging-elasticsearch
697
+ ----
698
+
699
+ Please note that changes to the configmap may not be picked up until the pods
700
+ are redeployed.
701
+
674
702
[[aggregated-fluentd]]
675
703
=== Fluentd
676
704
Original file line number Diff line number Diff line change @@ -1339,6 +1339,15 @@ $ oadm policy add-cluster-role-to-user oauth-editor \
1339
1339
system:serviceaccount:logging:logging-deployer
1340
1340
----
1341
1341
1342
+ . Ensure that the cluster role `rolebinding-reader` is assigned to the
1343
+ *aggregated-logging-elasticsearch* service account where `logging` is the namespace
1344
+ where aggregated logging is installed:
1345
+ +
1346
+ ----
1347
+ $ oadm policy add-cluster-role-to-user rolebinding-reader \
1348
+ system:serviceaccount:logging:aggregated-logging-elasticsearch
1349
+ ----
1350
+
1342
1351
. In preparation for running the deployer, ensure that you have the configurations
1343
1352
for your current deployment in the xref:../aggregate_logging.adoc#aggregate-logging-specifying-deployer-parameters[*logging-deployer* ConfigMap].
1344
1353
+
You can’t perform that action at this time.
0 commit comments