Skip to content

Commit 286e5f5

Browse files
committed
OBSDOCS-316-role-vs-clusterrole-for-monitoring-docs
1 parent e10a1c9 commit 286e5f5

File tree

56 files changed

+128
-124
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+128
-124
lines changed

modules/monitoring-accessing-alerting-rules-for-your-project.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@
66
[id="accessing-alerting-rules-for-your-project_{context}"]
77
= Accessing alerting rules for user-defined projects
88

9-
To list alerting rules for a user-defined project, you must have been assigned the `monitoring-rules-view` role for the project.
9+
To list alerting rules for a user-defined project, you must have been assigned the `monitoring-rules-view` cluster role for the project.
1010

1111
.Prerequisites
1212

1313
* You have enabled monitoring for user-defined projects.
14-
* You are logged in as a user that has the `monitoring-rules-view` role for your project.
14+
* You are logged in as a user that has the `monitoring-rules-view` cluster role for your project.
1515
* You have installed the OpenShift CLI (`oc`).
1616
1717
.Procedure

modules/monitoring-adding-a-secret-to-the-alertmanager-configuration.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ After you add a secret to the config map, the secret is mounted as a volume at `
1919

2020
ifndef::openshift-dedicated,openshift-rosa[]
2121
* *If you are configuring core {product-title} monitoring components in the `openshift-monitoring` project*:
22-
** You have access to the cluster as a user with the `cluster-admin` role.
22+
** You have access to the cluster as a user with the `cluster-admin` cluster role.
2323
** You have created the `cluster-monitoring-config` config map.
2424
** You have created the secret to be configured in Alertmanager in the `openshift-monitoring` project.
2525
* *If you are configuring components that monitor user-defined projects*:
2626
** A cluster administrator has enabled monitoring for user-defined projects.
27-
** You have access to the cluster as a user with the `cluster-admin` role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
27+
** You have access to the cluster as a user with the `cluster-admin` cluster role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
2828
** You have created the secret to be configured in Alertmanager in the `openshift-user-workload-monitoring` project.
2929
endif::openshift-dedicated,openshift-rosa[]
3030
ifdef::openshift-dedicated,openshift-rosa[]

modules/monitoring-applying-a-custom-configuration-to-alertmanager-for-user-defined-alert-routing.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
:_content-type: PROCEDURE
66
[id="applying-a-custom-configuration-to-alertmanager-for-user-defined-alert-routing_{context}"]
7-
= Applying a custom configuration to Alertmanager for user-defined alert routing
7+
= Applying a custom configuration to Alertmanager for user-defined alert routing
88

99
If you have enabled a separate instance of Alertmanager dedicated to user-defined alert routing, you can overwrite the configuration for this instance of Alertmanager by editing the `alertmanager-user-workload` secret in the `openshift-user-workload-monitoring` namespace.
1010

@@ -14,7 +14,7 @@ ifdef::openshift-rosa,openshift-dedicated[]
1414
* You have access to the cluster as a user with the `dedicated-admin` role.
1515
endif::[]
1616
ifndef::openshift-rosa,openshift-dedicated[]
17-
* You have access to the cluster as a user with the `cluster-admin` role.
17+
* You have access to the cluster as a user with the `cluster-admin` cluster role.
1818
endif::[]
1919
* You have installed the OpenShift CLI (`oc`).
2020

@@ -36,7 +36,7 @@ route:
3636
group_by:
3737
- name: Default
3838
routes:
39-
- matchers:
39+
- matchers:
4040
- "service = prometheus-example-monitor" <1>
4141
receiver: <receiver> <2>
4242
receivers:

modules/monitoring-applying-custom-alertmanager-configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can overwrite the default Alertmanager configuration by editing the `alertma
1010

1111
.Prerequisites
1212

13-
* You have access to the cluster as a user with the `cluster-admin` role.
13+
* You have access to the cluster as a user with the `cluster-admin` cluster role.
1414
1515
.Procedure
1616

modules/monitoring-assigning-tolerations-to-monitoring-components.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ endif::openshift-dedicated,openshift-rosa[]
1818

1919
ifndef::openshift-dedicated,openshift-rosa[]
2020
* *If you are configuring core {product-title} monitoring components*:
21-
** You have access to the cluster as a user with the `cluster-admin` role.
21+
** You have access to the cluster as a user with the `cluster-admin` cluster role.
2222
** You have created the `cluster-monitoring-config` `ConfigMap` object.
2323
* *If you are configuring components that monitor user-defined projects*:
24-
** You have access to the cluster as a user with the `cluster-admin` role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
24+
** You have access to the cluster as a user with the `cluster-admin` cluster role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
2525
** You have created the `user-workload-monitoring-config` `ConfigMap` object.
2626
endif::openshift-dedicated,openshift-rosa[]
2727
ifdef::openshift-dedicated,openshift-rosa[]

modules/monitoring-attaching-additional-labels-to-your-time-series-and-alerts.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ Using the external labels feature of Prometheus, you can attach custom labels to
1212

1313
ifndef::openshift-dedicated,openshift-rosa[]
1414
* *If you are configuring core {product-title} monitoring components*:
15-
** You have access to the cluster as a user with the `cluster-admin` role.
15+
** You have access to the cluster as a user with the `cluster-admin` cluster role.
1616
** You have created the `cluster-monitoring-config` `ConfigMap` object.
1717
* *If you are configuring components that monitor user-defined projects*:
18-
** You have access to the cluster as a user with the `cluster-admin` role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
18+
** You have access to the cluster as a user with the `cluster-admin` cluster role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
1919
** You have created the `user-workload-monitoring-config` `ConfigMap` object.
2020
endif::openshift-dedicated,openshift-rosa[]
2121
ifdef::openshift-dedicated,openshift-rosa[]

modules/monitoring-choosing-a-metrics-collection-profile.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ To choose a metrics collection profile for core {product-title} monitoring compo
1313
* You have installed the OpenShift CLI (`oc`).
1414
* You have enabled Technology Preview features by using the `FeatureGate` custom resource (CR).
1515
* You have created the `cluster-monitoring-config` `ConfigMap` object.
16-
* You have access to the cluster as a user with the `cluster-admin` role.
16+
* You have access to the cluster as a user with the `cluster-admin` cluster role.
1717
1818
[WARNING]
1919
====
@@ -46,7 +46,7 @@ data:
4646
----
4747
+
4848
<1> The name of the metrics collection profile.
49-
The available values are `full` or `minimal`.
49+
The available values are `full` or `minimal`.
5050
If you do not specify a value or if the `collectionProfile` key name does not exist in the config map, the default setting of `full` is used.
5151
+
5252
The following example sets the metrics collection profile to `minimal` for the core platform instance of Prometheus:

modules/monitoring-configuring-a-local-persistent-volume-claim.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ For monitoring components to use a persistent volume (PV), you must configure a
1717

1818
ifndef::openshift-dedicated,openshift-rosa[]
1919
* *If you are configuring core {product-title} monitoring components*:
20-
** You have access to the cluster as a user with the `cluster-admin` role.
20+
** You have access to the cluster as a user with the `cluster-admin` cluster role.
2121
** You have created the `cluster-monitoring-config` `ConfigMap` object.
2222
* *If you are configuring components that monitor user-defined projects*:
23-
** You have access to the cluster as a user with the `cluster-admin` role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
23+
** You have access to the cluster as a user with the `cluster-admin` cluster role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
2424
** You have created the `user-workload-monitoring-config` `ConfigMap` object.
2525
endif::openshift-dedicated,openshift-rosa[]
2626
ifdef::openshift-dedicated,openshift-rosa[]

modules/monitoring-configuring-alert-receivers.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ You can configure alert receivers to ensure that you learn about important issue
1111

1212
.Prerequisites
1313

14-
* You have access to the cluster as a user with the `cluster-admin` role.
14+
* You have access to the cluster as a user with the `cluster-admin` cluster role.
1515
1616
.Procedure
1717

modules/monitoring-configuring-external-alertmanagers.adoc

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ If you add the same external Alertmanager configuration for multiple clusters an
2020

2121
ifndef::openshift-dedicated,openshift-rosa[]
2222
* *If you are configuring core {product-title} monitoring components in the `openshift-monitoring` project*:
23-
** You have access to the cluster as a user with the `cluster-admin` role.
23+
** You have access to the cluster as a user with the `cluster-admin` cluster role.
2424
** You have created the `cluster-monitoring-config` config map.
2525
* *If you are configuring components that monitor user-defined projects*:
26-
** You have access to the cluster as a user with the `cluster-admin` role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
26+
** You have access to the cluster as a user with the `cluster-admin` cluster role, or as a user with the `user-workload-monitoring-config-edit` role in the `openshift-user-workload-monitoring` project.
2727
** You have created the `user-workload-monitoring-config` config map.
2828
endif::openshift-dedicated,openshift-rosa[]
2929
ifdef::openshift-dedicated,openshift-rosa[]
@@ -63,7 +63,7 @@ data:
6363
----
6464
+
6565
For `<alertmanager_specification>`, substitute authentication and other configuration details for additional Alertmanager instances.
66-
Currently supported authentication methods are bearer token (`bearerToken`) and client TLS (`tlsConfig`).
66+
Currently supported authentication methods are bearer token (`bearerToken`) and client TLS (`tlsConfig`).
6767
The following sample config map configures an additional Alertmanager using a bearer token with client TLS authentication:
6868
+
6969
[source,yaml]
@@ -85,13 +85,13 @@ data:
8585
name: alertmanager-bearer-token
8686
key: token
8787
tlsConfig:
88-
key:
88+
key:
8989
name: alertmanager-tls
9090
key: tls.key
91-
cert:
91+
cert:
9292
name: alertmanager-tls
9393
key: tls.crt
94-
ca:
94+
ca:
9595
name: alertmanager-tls
9696
key: tls.ca
9797
staticConfigs:
@@ -150,13 +150,13 @@ data:
150150
name: alertmanager-bearer-token
151151
key: token
152152
tlsConfig:
153-
key:
153+
key:
154154
name: alertmanager-tls
155155
key: tls.key
156-
cert:
156+
cert:
157157
name: alertmanager-tls
158158
key: tls.crt
159-
ca:
159+
ca:
160160
name: alertmanager-tls
161161
key: tls.ca
162162
staticConfigs:
@@ -172,3 +172,7 @@ ifndef::openshift-dedicated,openshift-rosa[]
172172
Configurations applied to the `user-workload-monitoring-config` `ConfigMap` object are not activated unless a cluster administrator has enabled monitoring for user-defined projects.
173173
====
174174
endif::openshift-dedicated,openshift-rosa[]
175+
176+
. Save the file to apply the changes to the `ConfigMap` object. The new component placement configuration is applied automatically.
177+
178+

0 commit comments

Comments
 (0)