You could expose Elasticsearch externally https://docs.okd.io/latest/install_config/aggregate_logging.html

|openshift_logging_es_allow_external|

Set to |true| to expose Elasticsearch as a reencrypt route. Set to |false| by default.


Except that username/password and token auth is currently broken due to the oauth proxy.

On 08/16/2018 07:16 AM, Tobias Brunner wrote:
Hi,

Does anyone have an idea how logs could be exported from the OpenShift
integrated logging for further analysis? Constraints: We can't give the
users access to the logging namespace and therefore also not to the
Elasticsearch Pod as this would allow the user to bypass access control
(Searchguard).

Thanks,
Tobias

_______________________________________________
users mailing list
users@lists.openshift.redhat.com
http://lists.openshift.redhat.com/openshiftmm/listinfo/users


_______________________________________________
users mailing list
users@lists.openshift.redhat.com
http://lists.openshift.redhat.com/openshiftmm/listinfo/users

Reply via email to