Skip to content

Commit 12f52aa

Browse files
committed
Updating install documentation and adding information on how to allow cluster-reader to view operations logs
1 parent 5f9a72d commit 12f52aa

File tree

2 files changed

+37
-0
lines changed

2 files changed

+37
-0
lines changed

install_config/aggregate_logging.adoc

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,19 @@ $ oadm policy add-cluster-role-to-user cluster-reader \
136136
this service account.
137137
====
138138

139+
. Enable the Elasticsearch service account to get cluster role bindings so that
140+
it can verify the roles that a user belongs to for allowing access to operations
141+
logs:
142+
+
143+
====
144+
----
145+
$ oadm policy add-cluster-role-to-user rolebinding-reader \
146+
system:serviceaccount:logging:aggregated-logging-elasticsearch <1>
147+
----
148+
<1> Use the project you created earlier (for example, *logging*) when specifying
149+
this service account.
150+
====
151+
139152
[[aggregate-logging-specifying-deployer-parameters]]
140153
== Specifying Deployer Parameters
141154

@@ -671,6 +684,21 @@ each new one to deploy it:
671684
$ oc scale --replicas=1 dc/logging-es-<suffix>
672685
----
673686

687+
[[cluster-reader-operations]]
688+
*Allowing cluster-reader to view operations logs*
689+
690+
By default, only cluster-admins are granted access in Elasticsearch and Kibana
691+
to view operations logs. To allow cluster-readers to also be able to view these
692+
logs, update the value of `openshift.operations.allow_cluster_reader` in the
693+
Elasticsearch configmap to be `true`:
694+
695+
----
696+
$ oc edit configmap/logging-elasticsearch
697+
----
698+
699+
Please note that changes to the configmap may not be picked up until the pods
700+
are redeployed.
701+
674702
[[aggregated-fluentd]]
675703
=== Fluentd
676704

install_config/upgrading/manual_upgrades.adoc

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1339,6 +1339,15 @@ $ oadm policy add-cluster-role-to-user oauth-editor \
13391339
system:serviceaccount:logging:logging-deployer
13401340
----
13411341

1342+
. Ensure that the cluster role `rolebinding-reader` is assigned to the
1343+
*aggregated-logging-elasticsearch* service account where `logging` is the namespace
1344+
where aggregated logging is installed:
1345+
+
1346+
----
1347+
$ oadm policy add-cluster-role-to-user rolebinding-reader \
1348+
system:serviceaccount:logging:aggregated-logging-elasticsearch
1349+
----
1350+
13421351
. In preparation for running the deployer, ensure that you have the configurations
13431352
for your current deployment in the xref:../aggregate_logging.adoc#aggregate-logging-specifying-deployer-parameters[*logging-deployer* ConfigMap].
13441353
+

0 commit comments

Comments
 (0)