blob: 35bd452ed541e3141e219d59646b6c3fe1562b30 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
|
---
- shell: >
echo "{{ (openshift_logging_use_ops) | ternary(openshift_logging_es_ops_host, openshift_logging_es_host) }}"
register: fluentd_ops_host
check_mode: no
- shell: >
echo "{{ (openshift_logging_use_ops) | ternary(openshift_logging_es_ops_port, openshift_logging_es_port) }}"
register: fluentd_ops_port
check_mode: no
- name: Generating Fluentd daemonset
template: src=fluentd.j2 dest={{mktemp.stdout}}/templates/logging-fluentd.yaml
vars:
daemonset_name: logging-fluentd
daemonset_component: fluentd
daemonset_container_name: fluentd-elasticsearch
daemonset_serviceAccount: aggregated-logging-fluentd
ops_host: "{{ fluentd_ops_host.stdout }}"
ops_port: "{{ fluentd_ops_port.stdout }}"
check_mode: no
- name: "Set permissions for fluentd"
command: >
{{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy
add-scc-to-user privileged system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd
register: fluentd_output
failed_when: "fluentd_output.rc == 1 and 'exists' not in fluentd_output.stderr"
check_mode: no
- name: "Set additional permissions for fluentd"
command: >
{{ openshift.common.admin_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig policy
add-cluster-role-to-user cluster-reader system:serviceaccount:{{openshift_logging_namespace}}:aggregated-logging-fluentd
register: fluentd2_output
failed_when: "fluentd2_output.rc == 1 and 'exists' not in fluentd2_output.stderr"
check_mode: no
|