Hide Forgot
Created attachment 1213414 [details] screenshot Description of problem: Cluster-admin is not able to view .all and operations logs. When he/she tried to view logs for normal projects, Kibana failed to load {{indexPattern.id}}, and asked him/her to confirm filters on UI, please refer to the attached screenshot. Version-Release number of selected component (if applicable): Built out image from https://github.com/openshift/origin-aggregated-logging openshift v1.4.0-alpha.0+c94f61a kubernetes v1.4.0+776c994 etcd 3.1.0-alpha.1 How reproducible: always Steps to Reproduce: 0.Start docker daemon with journal log driver on openshift nodes 1.Define local builds according to https://github.com/openshift/origin-aggregated-logging#defining-local-builds 2.Deploy logging with the built out images (OPS cluster is set to false, use_journal set to true). 3.Login kibana UI with Cluster-admin users, click on a normal index in the left panel Actual results: Cluster-admin is not able to view .all and operations logs. Cluster-admin have to confirm filters on UI before viewing normal projects' logs. Expected results: Cluster-admin should be able to view .all and operations logs. Cluster-admin should not have to accept filters before viewing normal projects' logs. Additional info: kibana/es pod log attached screenshot attached Issue reproduced when docker log driver is set to both json file and journal.
Created attachment 1213415 [details] es_log
Created attachment 1213416 [details] kibana_log
Created attachment 1213417 [details] flunetd_log
Hi Eric, Thanks for pointing out this change. After adding this new step during logging deployment, Cluster-admin still have to confirm filters on UI(is this ecpected?), and is able to view .all and operations logs: oadm policy add-cluster-role-to-user rolebinding-reader system:serviceaccount:logging:aggregated-logging-elasticsearch Please transfer this back for closure. Thanks, Xia
Verified on openshift v1.4.0-alpha.0+c94f61a kubernetes v1.4.0+776c994 etcd 3.1.0-alpha.1 Fixed after adding oadm policy add-cluster-role-to-user rolebinding-reader system:serviceaccount:logging:aggregated-logging-elasticsearch in logging deployment process