Skip to content

Commit e94380c

Browse files
authored
Merge pull request #33202 from rolfedh/RHDEVDOCS-3053
RHDEVDOCS-3053: Tracker for PR #33193, Fix missing label on OpenShift …
2 parents fa53a03 + f0f9ba3 commit e94380c

File tree

3 files changed

+42
-16
lines changed

3 files changed

+42
-16
lines changed

logging/cluster-logging-deploying.adoc

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,26 +24,38 @@ The process for deploying OpenShift Logging to {product-title} involves:
2424

2525
include::modules/cluster-logging-deploy-console.adoc[leveloffset=+1]
2626

27+
.Additional resources
28+
29+
* xref:../operators/admin/olm-adding-operators-to-cluster.adoc#olm-installing-operators-from-operatorhub_olm-adding-operators-to-a-cluster[Installing Operators from the OperatorHub]
30+
2731
== Post-installation tasks
2832

2933
If you plan to use Kibana, you must xref:#cluster-logging-visualizer-indices_cluster-logging-deploying[manually create your Kibana index patterns and visualizations] to explore and visualize data in Kibana.
3034

35+
If your cluster network provider enforces network isolation, xref:#cluster-logging-deploy-multitenant_cluster-logging-deploying[allow network traffic between the projects that contain the OpenShift Logging operators].
36+
37+
3138
include::modules/cluster-logging-deploy-cli.adoc[leveloffset=+1]
3239

3340
== Post-installation tasks
3441

3542
If you plan to use Kibana, you must xref:#cluster-logging-visualizer-indices_cluster-logging-deploying[manually create your Kibana index patterns and visualizations] to explore and visualize data in Kibana.
3643

44+
If your cluster network provider enforces network isolation, xref:#cluster-logging-deploy-multitenant_cluster-logging-deploying[allow network traffic between the projects that contain the OpenShift Logging operators].
45+
3746
include::modules/cluster-logging-visualizer-indices.adoc[leveloffset=+2]
3847

3948
include::modules/cluster-logging-deploy-multitenant.adoc[leveloffset=+2]
4049

50+
.Additional resources
51+
52+
* xref:../networking/network_policy/about-network-policy.adoc[About network policy]
53+
* xref:../networking/openshift_sdn/about-openshift-sdn.adoc[About the OpenShift SDN default CNI network provider]
54+
* xref:../networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc[About the OVN-Kubernetes default Container Network Interface (CNI) network provider]
55+
56+
4157
// include::modules/cluster-logging-deploy-memory.adoc[leveloffset=+1]
4258

4359
// include::modules/cluster-logging-deploy-certificates.adoc[leveloffset=+1]
4460

4561
// include::modules/cluster-logging-deploy-label.adoc[leveloffset=+1]
46-
47-
== Additional resources
48-
49-
* For more information on installing Operators, see xref:../operators/admin/olm-adding-operators-to-cluster.adoc#olm-installing-operators-from-operatorhub_olm-adding-operators-to-a-cluster[Installing Operators from the OperatorHub].

modules/cluster-logging-deploy-multitenant.adoc

Lines changed: 25 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,28 +3,43 @@
33
// * logging/cluster-logging-deploying.adoc
44

55
[id="cluster-logging-deploy-multitenant_{context}"]
6-
= Installing OpenShift Logging into a multitenant network
6+
= Allowing traffic between projects when network isolation is enabled
77

8-
If you are deploying OpenShift Logging into a cluster that uses multitenant isolation mode, projects are isolated from other projects. As a result, network traffic is not allowed between pods or services in different projects.
8+
Your cluster network provider might enforce network isolation. If so, you must allow network traffic between the projects that contain the operators deployed by OpenShift Logging.
99

10-
Because the OpenShift Elasticsearch Operator and the Red Hat OpenShift Logging Operator are installed in different projects, you must explicitly allow access between the `openshift-operators-redhat` and `openshift-logging` projects. How you allow this access depends on how you configured multitenant isolation mode.
10+
Network isolation blocks network traffic between pods or services that are in different projects. OpenShift Logging installs the _OpenShift Elasticsearch Operator_ in the `openshift-operators-redhat` project and the _Red Hat OpenShift Logging Operator_ in the `openshift-logging` project. Therefore, you must allow traffic between these two projects.
1111

12-
.Procedure
12+
{product-title} offers two supported choices for the default Container Network Interface (CNI) network provider, OpenShift SDN and OVN-Kubernetes. These two providers implement various network isolation policies.
1313

14-
To allow traffic between the OpenShift Elasticsearch Operator and the Red Hat OpenShift Logging Operator, perform one of the following:
14+
OpenShift SDN has three modes:
1515

16-
* If you configured multitenant isolation mode with the OpenShift SDN CNI plug-in set to the *Multitenant* mode, use the following command to join the two projects:
17-
+
18-
For example:
16+
network policy:: This is the default mode. If no policy is defined, it allows all traffic. However, if a user defines a policy, they typically start by denying all traffic and then adding exceptions. This process might break applications that are running in different projects. Therefore, explicitly configure the policy to allow traffic to egress from one logging-related project to the other.
17+
18+
multitenant:: This mode enforces network isolation. You must join the two logging-related projects to allow traffic between them.
19+
20+
subnet:: This mode allows all traffic. It does not enforce network isolation. No action is needed.
21+
22+
OVN-Kubernetes always uses a *network policy*. Therefore, as with OpenShift SDN, you must configure the policy to allow traffic to egress from one logging-related project to the other.
23+
24+
.Procedure
25+
26+
* If you are using OpenShift SDN in *multitenant* mode, join the two projects. For example:
1927
+
2028
[source,terminal]
2129
----
2230
$ oc adm pod-network join-projects --to=openshift-operators-redhat openshift-logging
2331
----
2432

25-
* If you configured multitenant isolation mode with the OpenShift SDN CNI plug-in set to the *NetworkPolicy* mode, create a network policy object in the `openshift-logging` namespace that allows ingress from the `openshift-operators-redhat` project to the `openshift-logging` project.
33+
* Otherwise, for OpenShift SDN in *network policy* mode and OVN-Kubernetes, perform the following actions:
34+
35+
.. Set a label on the `openshift-operators-redhat` namespace. For example:
2636
+
27-
For example:
37+
[source,terminal]
38+
----
39+
$ oc label namespace openshift-operators-redhat project=openshift-operators-redhat
40+
----
41+
42+
.. Create a network policy object in the `openshift-logging` namespace that allows ingress from the `openshift-operators-redhat` project to the `openshift-logging` project. For example:
2843
+
2944
[source,yaml]
3045
----
@@ -39,4 +54,3 @@ spec:
3954
matchLabels:
4055
project: openshift-operators-redhat
4156
----
42-

modules/cnf-performing-end-to-end-tests-for-platform-verification.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Validations include:
2424
* Having the SR-IOV Operator installed
2525
* Having the PTP Operator installed
2626
* Enabling the `contain-mount-namespace` mode via machine config
27-
* Using OVN kubernetes as the SDN
27+
* Using OVN-kubernetes as the cluster network provider
2828

2929
Latency tests, a part of the CNF-test container, also require the same validations. For more information about running a latency test, see the Running the latency tests section.
3030

0 commit comments

Comments
 (0)