Kibana and OpenShift: Difference between revisions
Jump to navigation
Jump to search
Line 51: | Line 51: | ||
Connect into the kibana container and attempt to establish a connection to ElasticSearch: | Connect into the kibana container and attempt to establish a connection to ElasticSearch: | ||
curl https | curl https://logging-es:9200/ --cacert /etc/kibana/keys/ca --key /etc/kibana/keys/key --cacert /etc/kibana/keys/cert |
Revision as of 20:31, 13 October 2017
External
Internal
Configuration
The external URL of the Kibana can be configured in the master configuration file, so it is made accessible from the console.
Components
OAuth2 Proxy
The Kibana OAuth2 Proxy for the Kibana console must share a secret with the master host's OAuth2 server - if the secrets are not identical on both nodes, the user will experience a login loop.
Kibana
Operations
Logging
Access Logging
oc logs -f <kibana-pod-name> -c kibana-proxy
oc logs -f logging-kibana-1-d4bw2 -c kibana-proxy
Main Kibana Process Logging
oc logs -f <kibana-pod-name> -c kibana
oc logs -f logging-kibana-1-d4bw2 -c kibana
Scale Up
oc scale dc/logging-kibana --replicas=2
To make sure the scale persists across multiple executions of the logging playbook, update the 'openshift_logging_kibana_replica_count' in the inventory file.
Troubleshooting
Login loop troubleshooting:
- https://docs.openshift.com/container-platform/latest/install_config/aggregate_logging.html#troubleshooting-kibana
- OpenShift Kibana login fails with redirect loop or Unable to connect https://access.redhat.com/solutions/2909691
Connect into the kibana container and attempt to establish a connection to ElasticSearch:
curl https://logging-es:9200/ --cacert /etc/kibana/keys/ca --key /etc/kibana/keys/key --cacert /etc/kibana/keys/cert