You could expose Elasticsearch externally
https://docs.okd.io/latest/install_config/aggregate_logging.html
|openshift_logging_es_allow_external|
Set to |true| to expose Elasticsearch as a reencrypt route. Set to
|false| by default.
Except that username/password and token auth is currently
Hi,
Does anyone have an idea how logs could be exported from the OpenShift
integrated logging for further analysis? Constraints: We can't give the
users access to the logging namespace and therefore also not to the
Elasticsearch Pod as this would allow the user to bypass access control
(Searchguar