This repository was archived by the owner on Apr 24, 2023. It is now read-only.
File tree 2 files changed +42
-0
lines changed
2 files changed +42
-0
lines changed Original file line number Diff line number Diff line change @@ -21,6 +21,12 @@ $ kubectl create -f https://raw.githubusercontent.com/fluent/fluent-bit-kubernet
21
21
$ kubectl create -f https://raw.githubusercontent.com/fluent/fluent-bit-kubernetes-logging/master/fluent-bit-role-binding.yaml
22
22
```
23
23
24
+ If you are deploying fluent-bit on openshift, you additionally need to run:
25
+
26
+ ```
27
+ $ kubectl create -f https://raw.githubusercontent.com/fluent/fluent-bit-kubernetes-logging/master/fluent-bit-openshift-security-context-constraints.yaml
28
+ ```
29
+
24
30
#### Fluent Bit to Elasticsearch
25
31
26
32
The next step is to create a ConfigMap that will be used by our Fluent Bit DaemonSet:
Original file line number Diff line number Diff line change
1
+ kind : SecurityContextConstraints
2
+ apiVersion : security.openshift.io/v1
3
+ metadata :
4
+ name : logging
5
+ allowPrivilegedContainer : true
6
+ allowHostNetwork : true
7
+ allowHostDirVolumePlugin : true
8
+ priority :
9
+ allowedCapabilities : []
10
+ allowHostPorts : true
11
+ allowHostPID : true
12
+ allowHostIPC : true
13
+ readOnlyRootFilesystem : false
14
+ requiredDropCapabilities : []
15
+ defaultAddCapabilities : []
16
+ runAsUser :
17
+ type : RunAsAny
18
+ seLinuxContext :
19
+ type : MustRunAs
20
+ fsGroup :
21
+ type : MustRunAs
22
+ supplementalGroups :
23
+ type : RunAsAny
24
+ volumes :
25
+ - configMap
26
+ - downwardAPI
27
+ - emptyDir
28
+ - hostPath
29
+ - persistentVolumeClaim
30
+ - projected
31
+ - secret
32
+ users :
33
+ - system:serviceaccount:logging:builder
34
+ - system:serviceaccount:logging:default
35
+ - system:serviceaccount:logging:deployer
36
+ - system:serviceaccount:logging:fluent-bit
You can’t perform that action at this time.
0 commit comments