You could expose Elasticsearch externally
https://docs.okd.io/latest/install_config/aggregate_logging.html
|openshift_logging_es_allow_external|
Set to |true| to expose Elasticsearch as a reencrypt route. Set to
|false| by default.
Except that username/password and token auth is currently broken due to
the oauth proxy.
On 08/16/2018 07:16 AM, Tobias Brunner wrote:
Hi,
Does anyone have an idea how logs could be exported from the OpenShift
integrated logging for further analysis? Constraints: We can't give the
users access to the logging namespace and therefore also not to the
Elasticsearch Pod as this would allow the user to bypass access control
(Searchguard).
Thanks,
Tobias
_______________________________________________
users mailing list
users@lists.openshift.redhat.com
http://lists.openshift.redhat.com/openshiftmm/listinfo/users
_______________________________________________
users mailing list
users@lists.openshift.redhat.com
http://lists.openshift.redhat.com/openshiftmm/listinfo/users