Skip to content

Commit 8f802fc

Browse files
committed
OBSDOCS-100: Update logging TLS requirements
1 parent cc83582 commit 8f802fc

6 files changed

+13
-19
lines changed

modules/cluster-logging-collector-log-forward-es.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ spec:
6464
<5> Specify the `elasticsearch` type.
6565
<6> Specify the URL and port of the external Elasticsearch instance as a valid absolute URL. You can use the `http` (insecure) or `https` (secure HTTP) protocol. If the cluster-wide proxy using the CIDR annotation is enabled, the output must be a server name or FQDN, not an IP Address.
6666
<7> For a secure connection, you can specify an `https` or `http` URL that you authenticate by specifying a `secret`.
67-
<8> For an `https` prefix, specify the name of the secret required by the endpoint for TLS communication. The secret must exist in the `openshift-logging` project, and must have keys of *tls.crt*, *tls.key*, and *ca-bundle.crt* that point to the respective certificates that they represent. Otherwise, for `http` and `https` prefixes, you can specify a secret that contains a username and password. For more information, see the following "Example: Setting a secret that contains a username and password."
67+
<8> For an `https` prefix, specify the name of the secret required by the endpoint for TLS communication. The secret must contain a `ca-bundle.crt` key that points to the certificate it represents. Otherwise, for `http` and `https` prefixes, you can specify a secret that contains a username and password. In legacy implementations, the secret must exist in the `openshift-logging` project. For more information, see the following "Example: Setting a secret that contains a username and password."
6868
<9> Optional: Specify a name for the pipeline.
6969
<10> Specify which log types to forward by using the pipeline: `application,` `infrastructure`, or `audit`.
7070
<11> Specify the name of the output to use when forwarding logs with this pipeline.

modules/cluster-logging-collector-log-forward-fluentd.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ spec:
5454
<3> Specify a name for the output.
5555
<4> Specify the `fluentdForward` type.
5656
<5> Specify the URL and port of the external Fluentd instance as a valid absolute URL. You can use the `tcp` (insecure) or `tls` (secure TCP) protocol. If the cluster-wide proxy using the CIDR annotation is enabled, the output must be a server name or FQDN, not an IP address.
57-
<6> If using a `tls` prefix, you must specify the name of the secret required by the endpoint for TLS communication. The secret must exist in the `openshift-logging` project, and must have keys of: *tls.crt*, *tls.key*, and *ca-bundle.crt* that point to the respective certificates that they represent.
57+
<6> If you are using a `tls` prefix, you must specify the name of the secret required by the endpoint for TLS communication. The secret must exist in the `openshift-logging` project and must contain a `ca-bundle.crt` key that points to the certificate it represents.
5858
<7> Optional: Specify a name for the pipeline.
5959
<8> Specify which log types to forward by using the pipeline: `application,` `infrastructure`, or `audit`.
6060
<9> Specify the name of the output to use when forwarding logs with this pipeline.

modules/cluster-logging-collector-log-forward-kafka.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ spec:
6767
<4> Specify a name for the output.
6868
<5> Specify the `kafka` type.
6969
<6> Specify the URL and port of the Kafka broker as a valid absolute URL, optionally with a specific topic. You can use the `tcp` (insecure) or `tls` (secure TCP) protocol. If the cluster-wide proxy using the CIDR annotation is enabled, the output must be a server name or FQDN, not an IP address.
70-
<7> If using a `tls` prefix, you must specify the name of the secret required by the endpoint for TLS communication. The secret must exist in the `openshift-logging` project, and must have keys of *tls.crt*, *tls.key*, and *ca-bundle.crt* that point to the respective certificates that they represent.
70+
<7> If you are using a `tls` prefix, you must specify the name of the secret required by the endpoint for TLS communication. The secret must contain a `ca-bundle.crt` key that points to the certificate it represents. In legacy implementations, the secret must exist in the `openshift-logging` project.
7171
<8> Optional: To send an insecure output, use a `tcp` prefix in front of the URL. Also omit the `secret` key and its `name` from this output.
7272
<9> Optional: Specify a name for the pipeline.
7373
<10> Specify which log types to forward by using the pipeline: `application,` `infrastructure`, or `audit`.

modules/cluster-logging-collector-log-forward-loki.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ spec:
5353
<5> Specify the type as `"loki"`.
5454
<6> Specify the URL and port of the Loki system as a valid absolute URL. You can use the `http` (insecure) or `https` (secure HTTP) protocol. If the cluster-wide proxy using the CIDR annotation is enabled, the output must be a server name or FQDN, not an IP Address. Loki's default port for HTTP(S) communication is 3100.
5555
<7> For a secure connection, you can specify an `https` or `http` URL that you authenticate by specifying a `secret`.
56-
<8> For an `https` prefix, specify the name of the secret required by the endpoint for TLS communication. The secret must exist in the `openshift-logging` project, and must have keys of *tls.crt*, *tls.key*, and *ca-bundle.crt* that point to the respective certificates that they represent. Otherwise, for `http` and `https` prefixes, you can specify a secret that contains a username and password. For more information, see the following "Example: Setting a secret that contains a username and password."
56+
<8> For an `https` prefix, specify the name of the secret required by the endpoint for TLS communication. The secret must contain a `ca-bundle.crt` key that points to the certificates it represents. Otherwise, for `http` and `https` prefixes, you can specify a secret that contains a username and password. In legacy implementations, the secret must exist in the `openshift-logging` project. For more information, see the following "Example: Setting a secret that contains a username and password."
5757
<9> Optional: Specify a metadata key field to generate values for the `TenantID` field in Loki. For example, setting `tenantKey: kubernetes.namespace_name` uses the names of the Kubernetes namespaces as values for tenant IDs in Loki. To see which other log record fields you can specify, see the "Log Record Fields" link in the following "Additional resources" section.
5858
<10> Optional: Specify a list of metadata field keys to replace the default Loki labels. Loki label names must match the regular expression `[a-zA-Z_:][a-zA-Z0-9_:]*`. Illegal characters in metadata keys are replaced with `_` to form the label name. For example, the `kubernetes.labels.foo` metadata key becomes Loki label `kubernetes_labels_foo`. If you do not set `labelKeys`, the default value is: `[log_type, kubernetes.namespace_name, kubernetes.pod_name, kubernetes_host]`. Keep the set of labels small because Loki limits the size and number of labels allowed. See link:https://grafana.com/docs/loki/latest/configuration/#limits_config[Configuring Loki, limits_config]. You can still query based on any log record field using query filters.
5959
<11> Optional: Specify a name for the pipeline.

modules/cluster-logging-collector-log-forward-syslog.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ spec:
7171
<5> Specify the `syslog` type.
7272
<6> Optional: Specify the syslog parameters, listed below.
7373
<7> Specify the URL and port of the external syslog instance. You can use the `udp` (insecure), `tcp` (insecure) or `tls` (secure TCP) protocol. If the cluster-wide proxy using the CIDR annotation is enabled, the output must be a server name or FQDN, not an IP address.
74-
<8> If using a `tls` prefix, you must specify the name of the secret required by the endpoint for TLS communication. The secret must exist in the `openshift-logging` project, and must have keys of *tls.crt*, *tls.key*, and *ca-bundle.crt* that point to the respective certificates that they represent.
74+
<8> If using a `tls` prefix, you must specify the name of the secret required by the endpoint for TLS communication. The secret must contain a `ca-bundle.crt` key that points to the certificate it represents. In legacy implementations, the secret must exist in the `openshift-logging` project.
7575
<9> Optional: Specify a name for the pipeline.
7676
<10> Specify which log types to forward by using the pipeline: `application,` `infrastructure`, or `audit`.
7777
<11> Specify the name of the output to use when forwarding logs with this pipeline.
@@ -87,7 +87,7 @@ spec:
8787
+
8888
[source,terminal]
8989
----
90-
$ oc create -f <file-name>.yaml
90+
$ oc create -f <filename>.yaml
9191
----
9292

9393
[id=cluster-logging-collector-log-forward-examples-syslog-log-source]

modules/cluster-logging-collector-log-forwarding-about.adoc

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -139,14 +139,9 @@ If your external logging aggregator becomes unavailable and cannot receive logs,
139139
== Supported Authorization Keys
140140
Common key types are provided here. Some output types support additional specialized keys, documented with the output-specific configuration field. All secret keys are optional. Enable the security features you want by setting the relevant keys. You are responsible for creating and maintaining any additional configurations that external destinations might require, such as keys and secrets, service accounts, port openings, or global proxy configuration. Open Shift Logging will not attempt to verify a mismatch between authorization combinations.
141141

142-
Transport Layer Security (TLS):: Using a TLS URL ('http://...' or 'ssl://...') without a Secret enables basic TLS server-side authentication. Additional TLS features are enabled by including a Secret and setting the following optional fields:
143-
144-
* `tls.crt`: (string) File name containing a client certificate. Enables mutual authentication. Requires `tls.key`.
145-
146-
* `tls.key`: (string) File name containing the private key to unlock the client certificate. Requires `tls.crt`.
142+
Transport Layer Security (TLS):: Using a TLS URL (`+http://...+` or `+ssl://...+`) without a secret enables basic TLS server-side authentication. Additional TLS features are enabled by including a secret and setting the following optional fields:
147143

148144
* `passphrase`: (string) Passphrase to decode an encoded TLS private key. Requires `tls.key`.
149-
150145
* `ca-bundle.crt`: (string) File name of a customer CA for server authentication.
151146

152147
Username and Password::
@@ -163,14 +158,13 @@ If missing or empty, the system defaults are used.
163158
== Creating a Secret
164159

165160
You can create a secret in the directory that contains your certificate and key files by using the following command:
166-
[subs="+quotes"]
161+
162+
[source,terminal]
167163
----
168-
$ oc create secret generic -n openshift-logging <my-secret> \
169-
--from-file=tls.key=<your_key_file>
170-
--from-file=tls.crt=<your_crt_file>
171-
--from-file=ca-bundle.crt=<your_bundle_file>
172-
--from-literal=username=<your_username>
173-
--from-literal=password=<your_password>
164+
$ oc create secret generic -n <namespace> <secret_name> \
165+
--from-file=ca-bundle.crt=<your_bundle_file> \
166+
--from-literal=username=<your_username> \
167+
--from-literal=password=<your_password>
174168
----
175169

176170
[NOTE]

0 commit comments

Comments
 (0)