diff options
| author | Scott Dodson <sdodson@redhat.com> | 2016-11-15 20:16:37 -0500 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2016-11-15 20:16:37 -0500 | 
| commit | dedc8742acecf6775dcd29a128ef1f0800c917e4 (patch) | |
| tree | 41dd816f25fb4bca0aab2724a3ff6271eb06fe57 /roles | |
| parent | a8b36bef4f7fc710fa27df96199c8ab71d8ac3d9 (diff) | |
| parent | 84bf91fff6b506a23f5c9d1d8ac4f6f32d53e7a6 (diff) | |
| download | openshift-dedc8742acecf6775dcd29a128ef1f0800c917e4.tar.gz openshift-dedc8742acecf6775dcd29a128ef1f0800c917e4.tar.bz2 openshift-dedc8742acecf6775dcd29a128ef1f0800c917e4.tar.xz openshift-dedc8742acecf6775dcd29a128ef1f0800c917e4.zip | |
Merge pull request #2810 from sdodson/BZ1390913
Add rolebinding-reader
Diffstat (limited to 'roles')
| -rw-r--r-- | roles/openshift_hosted_logging/tasks/deploy_logging.yaml | 23 | 
1 files changed, 18 insertions, 5 deletions
| diff --git a/roles/openshift_hosted_logging/tasks/deploy_logging.yaml b/roles/openshift_hosted_logging/tasks/deploy_logging.yaml index 0162d1fb0..625af9acd 100644 --- a/roles/openshift_hosted_logging/tasks/deploy_logging.yaml +++ b/roles/openshift_hosted_logging/tasks/deploy_logging.yaml @@ -40,7 +40,7 @@    - name: "Create templates for logging accounts and the deployer"      command: > -      {{ openshift.common.client_binary }} create +      {{ openshift.common.client_binary }} create --config={{ mktemp.stdout }}/admin.kubeconfig        -f {{ hosted_base }}/logging-deployer.yaml        --config={{ mktemp.stdout }}/admin.kubeconfig        -n logging @@ -49,28 +49,41 @@      changed_when: "'created' in logging_import_template.stdout"    - name: "Process the logging accounts template" -    shell:  "{{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig process logging-deployer-account-template |  {{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig create -f -" +    shell: > +      {{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig +      process logging-deployer-account-template |  {{ openshift.common.client_binary }} --config={{ mktemp.stdout }}/admin.kubeconfig create -f -      register: process_deployer_accounts      failed_when: process_deployer_accounts.rc == 1 and 'already exists' not in process_deployer_accounts.stderr    - name: "Set permissions for logging-deployer service account"      command: > -      {{ openshift.common.client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig policy add-cluster-role-to-user oauth-editor system:serviceaccount:logging:logging-deployer +      {{ openshift.common.client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig +      policy add-cluster-role-to-user oauth-editor system:serviceaccount:logging:logging-deployer      register: permiss_output      failed_when: "permiss_output.rc == 1 and 'exists' not in permiss_output.stderr"    - name: "Set permissions for fluentd"      command: > -      {{ openshift.common.client_binary }} adm policy add-scc-to-user privileged system:serviceaccount:logging:aggregated-logging-fluentd +      {{ openshift.common.client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig +      policy add-scc-to-user privileged system:serviceaccount:logging:aggregated-logging-fluentd      register: fluentd_output      failed_when: "fluentd_output.rc == 1 and 'exists' not in fluentd_output.stderr"    - name: "Set additional permissions for fluentd"      command: > -      {{ openshift.common.client_binary }} adm policy add-cluster-role-to-user cluster-reader system:serviceaccount:logging:aggregated-logging-fluentd +      {{ openshift.common.client_binary }} adm policy --config={{ mktemp.stdout }}/admin.kubeconfig +      add-cluster-role-to-user cluster-reader system:serviceaccount:logging:aggregated-logging-fluentd      register: fluentd2_output      failed_when: "fluentd2_output.rc == 1 and 'exists' not in fluentd2_output.stderr" +  - name: "Add rolebinding-reader to aggregated-logging-elasticsearch" +    command: > +      {{ openshift.common.client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig +      policy add-cluster-role-to-user rolebinding-reader \ +      system:serviceaccount:logging:aggregated-logging-elasticsearch +    register: rolebinding_reader_output +    failed_when: "rolebinding_reader_output == 1 and 'exists' not in rolebinding_reader_output.stderr" +    - name: "Create ConfigMap for deployer parameters"      command: >        {{ openshift.common.client_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig create configmap logging-deployer {{ deployer_cmap_params }} | 
