This documentation is for a release that is no longer maintained
See documentation for the latest supported version 3 or the latest supported version 4.Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 4. Updating cluster logging
After updating the OpenShift Container Platform cluster from 4.3 to 4.4, you must then upgrade cluster logging from 4.3 to 4.4.
4.1. Updating cluster logging Copier lienLien copié sur presse-papiers!
After updating the OpenShift Container Platform cluster, you can update cluster logging from 4.3 to 4.4 by updating the subscription for the Elasticsearch Operator and the Cluster Logging Operator.
Changes introduced by the new log forward feature modified the support for out_forward starting with the OpenShift Container Platform 4.3 release. You create a ConfigMap to configure out_forward. Any updates to the secure-forward.conf section of the Fluentd ConfigMap are removed.
If you use the out_forward plug-in, before updating, you can copy your current secure-forward.conf section from the Fluentd ConfigMap and use the copied data when you create the secure-forward ConfigMap.
Prerequisites
- Update the cluster from 4.3 to 4.4.
Make sure the cluster logging status is healthy:
-
All pods are
ready. - Elasticsearch cluster is healthy.
-
All pods are
-
Optionally, copy your current
secure-forward.confsection from the Fluentd ConfigMap for use if you want to create thesecure-forwardConfigMap. See the note above.
Procedure
Update the Elasticsearch Operator:
-
From the web console, click Operators
Installed Operators. -
Select the
openshift-operators-redhatproject. - Click the Elasticsearch Operator.
-
Click Subscription
Channel. - In the Change Subscription Update Channel window, select 4.4 and click Save.
Wait for a few seconds, then click Operators
Installed Operators. The Elasticsearch Operator is shown as 4.4. For example:
Elasticsearch Operator 4.4.0-201909201915 provided by Red Hat, Inc
Elasticsearch Operator 4.4.0-201909201915 provided by Red Hat, IncCopy to Clipboard Copied! Toggle word wrap Toggle overflow
-
From the web console, click Operators
Update the Cluster Logging Operator:
-
From the web console, click Operators
Installed Operators. -
Select the
openshift-loggingProject. - Click the Cluster Logging Operator.
-
Click Subscription
Channel. - In the Change Subscription Update Channel window, select 4.4 and click Save.
Wait for a few seconds, then click Operators
Installed Operators. The Cluster Logging Operator is shown as 4.4. For example:
Cluster Logging 4.4.0-201909201915 provided by Red Hat, Inc
Cluster Logging 4.4.0-201909201915 provided by Red Hat, IncCopy to Clipboard Copied! Toggle word wrap Toggle overflow
-
From the web console, click Operators
Check the logging components:
Ensure that the Elasticsearch pods are using a 4.4 image:
oc get pod -o yaml -n openshift-logging --selector component=elasticsearch |grep 'image:'
$ oc get pod -o yaml -n openshift-logging --selector component=elasticsearch |grep 'image:'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that all Elasticsearch pods are in the Ready status:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the Elasticsearch cluster is healthy:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the logging collector pods are using a 4.4 image:
oc get pod -n openshift-logging --selector logging-infra=fluentd -o yaml |grep 'image:'
$ oc get pod -n openshift-logging --selector logging-infra=fluentd -o yaml |grep 'image:'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the Kibana pods are using a 4.4 image:
oc get pod -n openshift-logging --selector logging-infra=kibana -o yaml |grep 'image:'
$ oc get pod -n openshift-logging --selector logging-infra=kibana -o yaml |grep 'image:'Copy to Clipboard Copied! Toggle word wrap Toggle overflow image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2 image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2
image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2 image: registry.redhat.io/openshift4/ose-logging-kibana5@sha256:3d657e3b90fae604a8351b1923250f93c04529b36e6ada0aba7c0a038ffef56e image: registry.redhat.io/openshift4/ose-oauth-proxy@sha256:5fe478210770b21c1eb26c1570bcbda40bc5a79011580ff5ebd4c701a5b04eb2Copy to Clipboard Copied! Toggle word wrap Toggle overflow Ensure that the Curator CronJob is using a 4.4 image:
oc get CronJob curator -n openshift-logging -o yaml |grep 'image:'
$ oc get CronJob curator -n openshift-logging -o yaml |grep 'image:'Copy to Clipboard Copied! Toggle word wrap Toggle overflow image: registry.redhat.io/openshift4/ose-logging-curator5@sha256:330c3499e790d0e184414125a4843cd48849c601eb9f19ff82f30794c858b0bc
image: registry.redhat.io/openshift4/ose-logging-curator5@sha256:330c3499e790d0e184414125a4843cd48849c601eb9f19ff82f30794c858b0bcCopy to Clipboard Copied! Toggle word wrap Toggle overflow