-
Notifications
You must be signed in to change notification settings - Fork 247
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
KFLUXBUGS-1610 - Update logging operator to 6.0.2. to pick up changes… (
#5071) * KFLUXBUGS-1610 - Update logging operator to 6.0.2. to pick up changes to better troubleshoot long log lines being dropped * KFLUXBUGS-1610 - Hold Logging Operator back on Prod
- Loading branch information
1 parent
de9a384
commit 89439c7
Showing
16 changed files
with
226 additions
and
15 deletions.
There are no files selected for viewing
33 changes: 24 additions & 9 deletions
33
components/monitoring/logging/base/configure-logging/configure-logforwarder.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,34 +1,49 @@ | ||
--- | ||
apiVersion: logging.openshift.io/v1 | ||
apiVersion: observability.openshift.io/v1 | ||
kind: ClusterLogForwarder | ||
metadata: | ||
annotations: | ||
argocd.argoproj.io/sync-options: SkipDryRunOnMissingResource=true | ||
argocd.argoproj.io/sync-wave: "1" | ||
name: instance | ||
spec: | ||
collector: | ||
resources: | ||
limits: {} | ||
requests: {} | ||
nodeSelector: {} | ||
tolerations: {} | ||
outputs: | ||
- name: splunk-receiver-application | ||
secret: | ||
name: log-forwarder-splunk-rhtap-application-secret | ||
type: splunk | ||
url: https://http-inputs-rhcorporate.splunkcloud.com | ||
splunk: | ||
url: https://http-inputs-rhcorporate.splunkcloud.com | ||
authentication: | ||
token: log-forwarder-splunk-rhtap-application-secret | ||
- name: splunk-receiver-audit | ||
secret: | ||
name: log-forwarder-splunk-rhtap-audit-secret | ||
type: splunk | ||
url: https://http-inputs-rhcorporate.splunkcloud.com | ||
splunk: | ||
url: https://http-inputs-rhcorporate.splunkcloud.com | ||
authentication: | ||
token: log-forwarder-splunk-rhtap-audit-secret | ||
filters: | ||
- name: parse-json | ||
type: parse | ||
pipelines: | ||
- name: fluentd-forward-logs-to-splunk-rhtap-app-index | ||
inputRefs: | ||
- application | ||
outputRefs: | ||
- splunk-receiver-application | ||
parse: json | ||
filterRefs: | ||
- parse-json | ||
- name: fluentd-forward-logs-to-splunk-rhtap-audit-index | ||
inputRefs: | ||
- infrastructure | ||
- audit | ||
outputRefs: | ||
- splunk-receiver-audit | ||
parse: json | ||
filterRefs: | ||
- parse-json | ||
serviceAccount: | ||
name: log-collector |
47 changes: 47 additions & 0 deletions
47
components/monitoring/logging/base/configure-logging/configure-service-account.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
kind: ServiceAccount | ||
apiVersion: v1 | ||
metadata: | ||
name: log-collector | ||
namespace: openshift-logging | ||
--- | ||
|
||
kind: ClusterRoleBinding | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
metadata: | ||
name: collect-infrastructure-logs | ||
subjects: | ||
- kind: ServiceAccount | ||
name: log-collector | ||
namespace: openshift-logging | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: collect-infrastructure-logs | ||
--- | ||
|
||
kind: ClusterRoleBinding | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
metadata: | ||
name: collect-application-logs | ||
subjects: | ||
- kind: ServiceAccount | ||
name: log-collector | ||
namespace: openshift-logging | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: collect-application-logs | ||
--- | ||
|
||
kind: ClusterRoleBinding | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
metadata: | ||
name: collect-audit-logs | ||
subjects: | ||
- kind: ServiceAccount | ||
name: log-collector | ||
namespace: openshift-logging | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: collect-audit-logs |
2 changes: 1 addition & 1 deletion
2
components/monitoring/logging/base/configure-logging/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
34 changes: 34 additions & 0 deletions
34
components/monitoring/logging/production/base/configure-logging/configure-logforwarder.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
--- | ||
apiVersion: logging.openshift.io/v1 | ||
kind: ClusterLogForwarder | ||
metadata: | ||
annotations: | ||
argocd.argoproj.io/sync-options: SkipDryRunOnMissingResource=true | ||
argocd.argoproj.io/sync-wave: "1" | ||
name: instance | ||
spec: | ||
outputs: | ||
- name: splunk-receiver-application | ||
secret: | ||
name: log-forwarder-splunk-rhtap-application-secret | ||
type: splunk | ||
url: https://http-inputs-rhcorporate.splunkcloud.com | ||
- name: splunk-receiver-audit | ||
secret: | ||
name: log-forwarder-splunk-rhtap-audit-secret | ||
type: splunk | ||
url: https://http-inputs-rhcorporate.splunkcloud.com | ||
pipelines: | ||
- name: fluentd-forward-logs-to-splunk-rhtap-app-index | ||
inputRefs: | ||
- application | ||
outputRefs: | ||
- splunk-receiver-application | ||
parse: json | ||
- name: fluentd-forward-logs-to-splunk-rhtap-audit-index | ||
inputRefs: | ||
- infrastructure | ||
- audit | ||
outputRefs: | ||
- splunk-receiver-audit | ||
parse: json |
10 changes: 10 additions & 0 deletions
10
components/monitoring/logging/production/base/configure-logging/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
apiVersion: kustomize.config.k8s.io/v1beta1 | ||
kind: Kustomization | ||
resources: | ||
- configure-log-collectors.yaml | ||
- configure-logforwarder.yaml | ||
|
||
namespace: "openshift-logging" | ||
|
||
generatorOptions: | ||
disableNameSuffixHash: true |
5 changes: 5 additions & 0 deletions
5
components/monitoring/logging/production/base/external-secrets/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
apiVersion: kustomize.config.k8s.io/v1beta1 | ||
kind: Kustomization | ||
resources: | ||
- splunk-log-forwarder-external-secrets.yaml | ||
namespace: openshift-logging |
37 changes: 37 additions & 0 deletions
37
...oring/logging/production/base/external-secrets/splunk-log-forwarder-external-secrets.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
apiVersion: external-secrets.io/v1beta1 | ||
kind: ExternalSecret | ||
metadata: | ||
name: log-forwarder-splunk-rhtap-application-external-secret | ||
annotations: | ||
argocd.argoproj.io/sync-options: SkipDryRunOnMissingResource=true | ||
argocd.argoproj.io/sync-wave: "-1" | ||
spec: | ||
dataFrom: | ||
- extract: | ||
key: "" # will be added by the overlays | ||
refreshInterval: 1h | ||
secretStoreRef: | ||
name: appsre-stonesoup-vault | ||
kind: ClusterSecretStore | ||
target: | ||
name: log-forwarder-splunk-rhtap-application-secret | ||
deletionPolicy: Delete | ||
--- | ||
apiVersion: external-secrets.io/v1beta1 | ||
kind: ExternalSecret | ||
metadata: | ||
name: log-forwarder-splunk-rhtap-audit-external-secret | ||
annotations: | ||
argocd.argoproj.io/sync-options: SkipDryRunOnMissingResource=true | ||
argocd.argoproj.io/sync-wave: "-1" | ||
spec: | ||
dataFrom: | ||
- extract: | ||
key: "" # will be added by the overlays | ||
refreshInterval: 1h | ||
secretStoreRef: | ||
name: appsre-stonesoup-vault | ||
kind: ClusterSecretStore | ||
target: | ||
name: log-forwarder-splunk-rhtap-audit-secret | ||
deletionPolicy: Delete |
15 changes: 15 additions & 0 deletions
15
components/monitoring/logging/production/base/install-logging-operator.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
# On managed clusters, there is no need to create the openshift-logging | ||
# namespace because it's created automatically by hive. | ||
--- | ||
apiVersion: operators.coreos.com/v1alpha1 | ||
kind: Subscription | ||
metadata: | ||
name: cluster-logging | ||
namespace: openshift-logging | ||
annotations: | ||
argocd.argoproj.io/sync-wave: "0" | ||
spec: | ||
channel: "stable" | ||
name: cluster-logging | ||
source: redhat-operators | ||
sourceNamespace: openshift-marketplace |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 4 additions & 0 deletions
4
...nents/monitoring/logging/production/base/logging-operator-prerequisite/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
apiVersion: kustomize.config.k8s.io/v1beta1 | ||
kind: Kustomization | ||
resources: | ||
- operatorgroup.yaml |
10 changes: 10 additions & 0 deletions
10
...nents/monitoring/logging/production/base/logging-operator-prerequisite/operatorgroup.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
apiVersion: operators.coreos.com/v1 | ||
kind: OperatorGroup | ||
metadata: | ||
name: cluster-logging | ||
namespace: openshift-logging | ||
annotations: | ||
argocd.argoproj.io/sync-wave: "0" | ||
spec: | ||
targetNamespaces: | ||
- openshift-logging |
4 changes: 4 additions & 0 deletions
4
components/monitoring/logging/production/base/rbac/kustomization.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
apiVersion: kustomize.config.k8s.io/v1beta1 | ||
kind: Kustomization | ||
resources: | ||
- logging-admin.yaml |
24 changes: 24 additions & 0 deletions
24
components/monitoring/logging/production/base/rbac/logging-admin.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: Role | ||
metadata: | ||
name: all-access-openshift-logging | ||
namespace: openshift-logging | ||
rules: | ||
- apiGroups: [""] | ||
resources: ["*"] | ||
verbs: ["*"] | ||
--- | ||
|
||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: RoleBinding | ||
metadata: | ||
name: all-access-openshift-logging | ||
namespace: openshift-logging | ||
subjects: | ||
- apiGroup: rbac.authorization.k8s.io | ||
kind: Group | ||
name: konflux-o11y-admins | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: Role | ||
name: all-access-openshift-logging |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters