14.2.4 Creating the ConfigMap
Perform the following steps to create the Kubernetes ConfigMap for ELK:
- Copy the
elk.crt
file to the$WORKDIR/kubernetes/elasticsearch-and-kibana
directory. - Navigate to the
$WORKDIR/kubernetes/elasticsearch-and-kibana
directory and run the following:
For example:kubectl create configmap elk-cert --from-file=elk.crt -n <namespace>
The output will look similar to the following:kubectl create configmap elk-cert --from-file=elk.crt -n oamns
configmap/elk-cert created
- Create a
logstash_cm.yaml
file in the$WORKDIR/kubernetes/elasticsearch-and-kibana
directory as follows:
Change the values in the above file as follows:apiVersion: v1 kind: ConfigMap metadata: name: oam-logstash-configmap namespace: <ELKNS> data: logstash.yml: | #http.host: "0.0.0.0" logstash-config.conf: | input { file { path => "<Log Home>/**/logs/AdminServer*.log" tags => "Adminserver_log" start_position => beginning } file { path => "<Log Home>/**/logs/oam_policy_mgr*.log" tags => "Policymanager_log" start_position => beginning } file { path => "<Log Home>/**/logs/oam_server*.log" tags => "Oamserver_log" start_position => beginning } file { path => "<Domain Home>/servers/AdminServer/logs/AdminServer-diagnostic.log" tags => "Adminserver_diagnostic" start_position => beginning } file { path => "<Domain Home>/servers/**/logs/oam_policy_mgr*-diagnostic.log" tags => "Policy_diagnostic" start_position => beginning } file { path => "<Domain Home>/servers/AdminServer/logs/auditlogs/OAM/audit.log" tags => "Audit_logs" start_position => beginning } } filter { grok { match => [ "message", "<%{DATA:log_timestamp}> <%{WORD:log_level}> <%{WORD:thread}> <%{HOSTNAME:hostname}> <%{HOSTNAME:servername}> <%{DATA:timer}> <<%{DATA:kernel}>> <> <%{DATA:uuid}> <%{NUMBER:timestamp}> <%{DATA:misc}> <%{DATA:log_number}> <%{DATA:log_message}>" ] } if "_grokparsefailure" in [tags] { mutate { remove_tag => [ "_grokparsefailure" ] } } } output { elasticsearch { hosts => ["<ELK_HOSTS>"] cacert => '/usr/share/logstash/config/certs/elk.crt' index => "oamlogs-000001" ssl => true ssl_certificate_verification => false user => "<ELK_USER>" password => "${ELASTICSEARCH_PASSWORD}" api_key => "${ELASTICSEARCH_PASSWORD}" } }
- Change the
<ELKNS>
,<ELK_HOSTS>
,<ELK_SSL>
, and<ELK_USER>
to match the values in Variables Used in This Section. - Change
<Log Home>
and<Domain Home>
to match theLog Home
andDomain Home
returned in Finding Required Domain Details. - If using API KEY for your ELK authentication, delete the
user
andpassword
lines. - If using a password for ELK authentication, delete the
api_key
line. - If no authentication is used for ELK, delete the
user
,password
, andapi_key
lines.
apiVersion: v1 kind: ConfigMap metadata: name: oam-logstash-configmap namespace: oamns data: logstash.yml: | #http.host: "0.0.0.0" logstash-config.conf: | input { file { path => "/u01/oracle/user_projects/domains/logs/accessdomain/**/logs/AdminServer*.log" tags => "Adminserver_log" start_position => beginning } file { path => "/u01/oracle/user_projects/domains/logs/accessdomain/**/logs/oam_policy_mgr*.log" tags => "Policymanager_log" start_position => beginning } file { path => "/u01/oracle/user_projects/domains/logs/accessdomain/**/logs/oam_server*.log" tags => "Oamserver_log" start_position => beginning } file { path => "/u01/oracle/user_projects/domains/accessdomain/servers/AdminServer/logs/AdminServer-diagnostic.log" tags => "Adminserver_diagnostic" start_position => beginning } file { path => "/u01/oracle/user_projects/domains/accessdomain/servers/**/logs/oam_policy_mgr*-diagnostic.log" tags => "Policy_diagnostic" start_position => beginning } file { path => "/u01/oracle/user_projects/domains/accessdomain/servers/AdminServer/logs/auditlogs/OAM/audit.log" tags => "Audit_logs" start_position => beginning } } filter { grok { match => [ "message", "<%{DATA:log_timestamp}> <%{WORD:log_level}> <%{WORD:thread}> <%{HOSTNAME:hostname}> <%{HOSTNAME:servername}> <%{DATA:timer}> <<%{DATA:kernel}>> <> <%{DATA:uuid}> <%{NUMBER:timestamp}> <%{DATA:misc}> <%{DATA:log_number}> <%{DATA:log_message}>" ] } if "_grokparsefailure" in [tags] { mutate { remove_tag => [ "_grokparsefailure" ] } } } output { elasticsearch { hosts => ["https://elasticsearch.example.com:9200"] cacert => '/usr/share/logstash/config/certs/elk.crt' index => "oamlogs-000001" ssl => true ssl_certificate_verification => false user => "logstash_internal" password => "${ELASTICSEARCH_PASSWORD}" } }
- Change the
- Run the following command to create the
ConfigMap:
The output will look similar to the following:kubectl apply -f logstash_cm.yaml
configmap/oam-logstash-configmap created