You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/logging-loki-log-access.adoc
+28-1
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ In {logging} 5.8 and later, the {clo} does not grant all users access to logs by
12
12
* Namespace scoped policies
13
13
* Creation of custom admin groups
14
14
15
-
As an administrator, you need to create the role bindings and cluster role bindings appropriate for your deployment. The {clo} provides the following cluster roles:
15
+
As an administrator, you need to create the role bindings and cluster role bindings appropriate for your deployment. {clo} provides the following cluster roles:
16
16
17
17
* `cluster-logging-application-view` grants permission to read application logs.
18
18
* `cluster-logging-infrastructure-view` grants permission to read infrastructure logs.
@@ -70,10 +70,36 @@ subjects:
70
70
----
71
71
<1> Specifies the namespace this `RoleBinding` applies to.
72
72
73
+
tag::ForNetObserv[]
73
74
== Custom admin group access
74
75
75
76
If you have a large deployment with a number of users who require broader permissions, you can create a custom group using the `adminGroup` field. Users who are members of any group specified in the `adminGroups` field of the `LokiStack` CR are considered admins. Admin users have access to all application logs in all namespaces, if they also get assigned the `cluster-logging-application-view` role.
76
77
78
+
ifdef::network_observability[]
79
+
.Example LokiStack CR
80
+
[source,yaml]
81
+
----
82
+
apiVersion: loki.grafana.com/v1
83
+
kind: LokiStack
84
+
metadata:
85
+
name: logging-loki
86
+
namespace: openshift-logging
87
+
spec:
88
+
tenants:
89
+
mode: openshift-network # <1>
90
+
openshift:
91
+
adminGroups: # <2>
92
+
- cluster-admin
93
+
- custom-admin-group # <3>
94
+
----
95
+
<1> Custom admin groups are only available in this mode.
96
+
<2> Entering an empty list `[]` value for this field disables admin groups.
97
+
<3> Overrides the default groups (`system:cluster-admins`, `cluster-admin`, `dedicated-admin`)
98
+
endif::network_observability[]
99
+
100
+
end::ForNetObserv[]
101
+
102
+
ifdef::cluster-logging-loki[]
77
103
.Example LokiStack CR
78
104
[source,yaml]
79
105
----
@@ -93,3 +119,4 @@ spec:
93
119
<1> Custom admin groups are only available in this mode.
94
120
<2> Entering an empty list `[]` value for this field disables admin groups.
95
121
<3> Overrides the default groups (`system:cluster-admins`, `cluster-admin`, `dedicated-admin`)
* xref:../logging/log_storage/cluster-logging-loki.adoc#logging-creating-new-group-cluster-admin-user-role_cluster-logging-loki[Creating a new group for the cluster-admin user role]
If you have a large deployment with a number of users who require broader permissions, you can create a custom group using the `adminGroup` field. Users who are members of any group specified in the `adminGroups` field of the `LokiStack` CR are considered admins. Admin users have access to all application logs in all namespaces, if they also get assigned the `cluster-logging-application-view` role.
36
+
37
+
.Example LokiStack CR
38
+
[source,yaml]
39
+
----
40
+
apiVersion: loki.grafana.com/v1
41
+
kind: LokiStack
42
+
metadata:
43
+
name: logging-loki
44
+
namespace: openshift-logging
45
+
spec:
46
+
tenants:
47
+
mode: openshift-network # <1>
48
+
openshift:
49
+
adminGroups: # <2>
50
+
- cluster-admin
51
+
- custom-admin-group # <3>
52
+
----
53
+
<1> Custom admin groups are only available in this mode.
54
+
<2> Entering an empty list `[]` value for this field disables admin groups.
55
+
<3> Overrides the default groups (`system:cluster-admins`, `cluster-admin`, `dedicated-admin`)
0 commit comments