This documentation is for a release that is no longer maintained
See documentation for the latest supported version 3 or the latest supported version 4.Chapter 4. Updating cluster logging
After updating the OpenShift Container Platform cluster from 4.3 to 4.4, you must then upgrade cluster logging from 4.3 to 4.4.
4.1. Updating cluster logging Copy linkLink copied to clipboard!
After updating the OpenShift Container Platform cluster, you can update cluster logging from 4.3 to 4.4 by updating the subscription for the Elasticsearch Operator and the Cluster Logging Operator.
Changes introduced by the new log forward feature modified the support for out_forward starting with the OpenShift Container Platform 4.3 release. You create a ConfigMap to configure out_forward. Any updates to the secure-forward.conf
section of the Fluentd ConfigMap are removed.
If you use the out_forward plug-in, before updating, you can copy your current secure-forward.conf
section from the Fluentd ConfigMap and use the copied data when you create the secure-forward
ConfigMap.
Prerequisites
- Update the cluster from 4.3 to 4.4.
Make sure the cluster logging status is healthy:
-
All pods are
ready
. - Elasticsearch cluster is healthy.
-
All pods are
-
Optionally, copy your current
secure-forward.conf
section from the Fluentd ConfigMap for use if you want to create thesecure-forward
ConfigMap. See the note above.
Procedure
Update the Elasticsearch Operator:
-
From the web console, click Operators
Installed Operators. -
Select the
openshift-operators-redhat
project. - Click the Elasticsearch Operator.
-
Click Subscription
Channel. - In the Change Subscription Update Channel window, select 4.4 and click Save.
Wait for a few seconds, then click Operators
Installed Operators. The Elasticsearch Operator is shown as 4.4. For example:
Elasticsearch Operator 4.4.0-201909201915 provided by Red Hat, Inc
Elasticsearch Operator 4.4.0-201909201915 provided by Red Hat, Inc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
From the web console, click Operators
Update the Cluster Logging Operator:
-
From the web console, click Operators
Installed Operators. -
Select the
openshift-logging
Project. - Click the Cluster Logging Operator.
-
Click Subscription
Channel. - In the Change Subscription Update Channel window, select 4.4 and click Save.
Wait for a few seconds, then click Operators
Installed Operators. The Cluster Logging Operator is shown as 4.4. For example:
Cluster Logging 4.4.0-201909201915 provided by Red Hat, Inc
Cluster Logging 4.4.0-201909201915 provided by Red Hat, Inc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
From the web console, click Operators
Check the logging components:
Ensure that the Elasticsearch pods are using a 4.4 image:
oc get pod -o yaml -n openshift-logging --selector component=elasticsearch |grep 'image:'
$ oc get pod -o yaml -n openshift-logging --selector component=elasticsearch |grep 'image:'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that all Elasticsearch pods are in the Ready status:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the Elasticsearch cluster is healthy:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the logging collector pods are using a 4.4 image:
oc get pod -n openshift-logging --selector logging-infra=fluentd -o yaml |grep 'image:'
$ oc get pod -n openshift-logging --selector logging-infra=fluentd -o yaml |grep 'image:'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the Kibana pods are using a 4.4 image:
oc get pod -n openshift-logging --selector logging-infra=kibana -o yaml |grep 'image:'
$ oc get pod -n openshift-logging --selector logging-infra=kibana -o yaml |grep 'image:'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2 image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2
image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2 image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the Curator CronJob is using a 4.4 image:
oc get CronJob curator -n openshift-logging -o yaml |grep 'image:'
$ oc get CronJob curator -n openshift-logging -o yaml |grep 'image:'
Copy to Clipboard Copied! Toggle word wrap Toggle overflow image: registry.redhat.io/openshift4/ose-logging-curator5@sha256:330c3499e790d0e184414125a4843cd48849c601eb9f19ff82f30794c858b0bc
image: registry.redhat.io/openshift4/ose-logging-curator5@sha256:330c3499e790d0e184414125a4843cd48849c601eb9f19ff82f30794c858b0bc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow