Skip to content

Commit 1dc4dcb

Browse files
committed
Notes and changes for for logging stack upgrade
Adding suggestions from ewolinetz Adding suggestions from ewolinetz Updating install documentation and adding information on how to allow cluster-reader to view operations logs Follow-up to ewolinet's notes on 'rolebinding-reader'
1 parent 5808a32 commit 1dc4dcb

File tree

2 files changed

+59
-0
lines changed

2 files changed

+59
-0
lines changed

install_config/aggregate_logging.adoc

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,19 @@ $ oadm policy add-cluster-role-to-user cluster-reader \
136136
this service account.
137137
====
138138

139+
. Enable the Elasticsearch service account to get cluster role bindings so that
140+
it can verify a user's roles and allow access to operations
141+
logs:
142+
+
143+
====
144+
----
145+
$ oadm policy add-cluster-role-to-user rolebinding-reader \
146+
system:serviceaccount:logging:aggregated-logging-elasticsearch <1>
147+
----
148+
<1> Use the project you created earlier (for example, *logging*) when specifying
149+
this service account.
150+
====
151+
139152
[[aggregate-logging-specifying-deployer-parameters]]
140153
== Specifying Deployer Parameters
141154

@@ -672,6 +685,21 @@ each new one to deploy it:
672685
$ oc scale --replicas=1 dc/logging-es-<suffix>
673686
----
674687

688+
[[cluster-reader-operations]]
689+
*Allowing cluster-reader to view operations logs*
690+
691+
By default, only `cluster-admin` users are granted access in Elasticsearch and
692+
Kibana to view operations logs. To allow `cluster-reader` users to also view these
693+
logs, update the value of `openshift.operations.allow_cluster_reader` in the
694+
Elasticsearch configmap to `true`:
695+
696+
----
697+
$ oc edit configmap/logging-elasticsearch
698+
----
699+
700+
Please note that changes to the configmap might not appear until after redeploying
701+
the pods.
702+
675703
[[aggregated-fluentd]]
676704
=== Fluentd
677705

install_config/upgrading/manual_upgrades.adoc

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1344,6 +1344,15 @@ $ oadm policy add-cluster-role-to-user oauth-editor \
13441344
system:serviceaccount:logging:logging-deployer
13451345
----
13461346

1347+
. Ensure that the cluster role `rolebinding-reader` is assigned to the
1348+
*aggregated-logging-elasticsearch* service account where `logging` is the namespace
1349+
with aggregated logging installed:
1350+
+
1351+
----
1352+
$ oadm policy add-cluster-role-to-user rolebinding-reader \
1353+
system:serviceaccount:logging:aggregated-logging-elasticsearch
1354+
----
1355+
13471356
. In preparation for running the deployer, ensure that you have the configurations
13481357
for your current deployment in the xref:../aggregate_logging.adoc#aggregate-logging-specifying-deployer-parameters[*logging-deployer* ConfigMap].
13491358
+
@@ -1370,6 +1379,28 @@ of Fluentd pods, the deployer does delete the *logging-fluentd* Daemonset and re
13701379
it from the *logging-fluentd-template* template.
13711380
====
13721381

1382+
The latest EFK stack now uses Elasticsearch 2.3 with a common data model. This
1383+
means Fluentd sends logs to Elasticsearch with a new indexing pattern for
1384+
projects. The pattern is:
1385+
+
1386+
----
1387+
project.{namespace_name}.{namespace_id}.YYYY.MM.DD
1388+
----
1389+
+
1390+
For example:
1391+
+
1392+
----
1393+
project.logging.5dad9bd0-a7a1-11e6-94a0-5254000db84b.2016.11.14
1394+
----
1395+
1396+
The pattern for the `operations` logs remains the same.
1397+
1398+
[IMPORTANT]
1399+
====
1400+
Downgrading from Elasticsearch 2.3 to Elasticsearch 1.x is not possible due to
1401+
migration to a new data structure.
1402+
====
1403+
13731404
[[manual-upgrading-cluster-metrics]]
13741405
== Upgrading Cluster Metrics
13751406

0 commit comments

Comments
 (0)