Questo contenuto non è disponibile nella lingua selezionata.
Chapter 4. Setting audit log levels for the Prometheus Adapter
In default platform monitoring, you can configure the audit log level for the Prometheus Adapter.
Prerequisites
-
You have installed the OpenShift CLI ().
oc -
You have access to the cluster as a user with the cluster role.
cluster-admin -
You have created the
cluster-monitoring-configobject.ConfigMap
Procedure
You can set an audit log level for the Prometheus Adapter in the default
openshift-monitoring
Edit the
cluster-monitoring-configobject in theConfigMapproject:openshift-monitoring$ oc -n openshift-monitoring edit configmap cluster-monitoring-configAdd
in theprofile:section underk8sPrometheusAdapter/audit:data/config.yamlapiVersion: v1 kind: ConfigMap metadata: name: cluster-monitoring-config namespace: openshift-monitoring data: config.yaml: | k8sPrometheusAdapter: audit: profile: <audit_log_level>1 - 1
- The audit log level to apply to the Prometheus Adapter.
Set the audit log level by using one of the following values for the
parameter:profile:-
: Do not log events.
None -
: Log only the metadata for the request, such as user, timestamp, and so forth. Do not log the request text and the response text.
Metadatais the default audit log level.Metadata -
: Log only the metadata and the request text but not the response text. This option does not apply for non-resource requests.
Request -
: Log event metadata, request text, and response text. This option does not apply for non-resource requests.
RequestResponse
-
Save the file to apply the changes. The pods for the Prometheus Adapter restart automatically when you apply the change.
WarningWhen changes are saved to a monitoring config map, the pods and other resources in the related project might be redeployed. The running monitoring processes in that project might also be restarted.
Verification
-
In the config map, under , set the log level to
k8sPrometheusAdapter/audit/profileand save the file.Request Confirm that the pods for the Prometheus Adapter are running. The following example lists the status of pods in the
project:openshift-monitoring$ oc -n openshift-monitoring get podsConfirm that the audit log level and audit log file path are correctly configured:
$ oc -n openshift-monitoring get deploy prometheus-adapter -o yamlExample output
... - --audit-policy-file=/etc/audit/request-profile.yaml - --audit-log-path=/var/log/adapter/audit.logConfirm that the correct log level has been applied in the
deployment in theprometheus-adapterproject:openshift-monitoring$ oc -n openshift-monitoring exec deploy/prometheus-adapter -c prometheus-adapter -- cat /etc/audit/request-profile.yamlExample output
"apiVersion": "audit.k8s.io/v1" "kind": "Policy" "metadata": "name": "Request" "omitStages": - "RequestReceived" "rules": - "level": "Request"NoteIf you enter an unrecognized
value for the Prometheus Adapter in theprofileobject, no changes are made to the Prometheus Adapter, and an error is logged by the Cluster Monitoring Operator.ConfigMapReview the audit log for the Prometheus Adapter:
$ oc -n openshift-monitoring exec -c <prometheus_adapter_pod_name> -- cat /var/log/adapter/audit.log
4.1. Disabling the local Alertmanager Copia collegamentoCollegamento copiato negli appunti!
A local Alertmanager that routes alerts from Prometheus instances is enabled by default in the
openshift-monitoring
If you do not need the local Alertmanager, you can disable it by configuring the
cluster-monitoring-config
openshift-monitoring
Prerequisites
-
You have access to the cluster as a user with the cluster role.
cluster-admin -
You have created the config map.
cluster-monitoring-config -
You have installed the OpenShift CLI ().
oc
Procedure
Edit the
config map in thecluster-monitoring-configproject:openshift-monitoring$ oc -n openshift-monitoring edit configmap cluster-monitoring-configAdd
for theenabled: falsecomponent underalertmanagerMain:data/config.yamlapiVersion: v1 kind: ConfigMap metadata: name: cluster-monitoring-config namespace: openshift-monitoring data: config.yaml: | alertmanagerMain: enabled: false- Save the file to apply the changes. The Alertmanager instance is disabled automatically when you apply the change.
4.2. Next steps Copia collegamentoCollegamento copiato negli appunti!
- Enabling monitoring for user-defined projects
- Learn about remote health reporting and, if necessary, opt out of it.