summaryrefslogtreecommitdiffstats
path: root/roles/openshift_logging/tasks/generate_secrets.yaml
Commit message (Collapse)AuthorAgeFilesLines
* add ability to expose Elasticsearch as an external routeRich Megginson2017-05-181-0/+28
| | | | | | | | | | | | | | This adds the ability to expose Elastisearch as a route outside of the cluster. - `openshift_logging_es_allow_external`: True (default is False) - if this is True, Elasticsearch will be exposed as a Route - `openshift_logging_es_ops_hostname`: The external facing hostname to use for the route and the TLS server certificate (default is "es." + `openshift_master_default_subdomain`) There are other similar parameters for the TLS server cert, key, and CA cert. There are other similar parameters for when the OPS cluster is deployed e.g. `openshift_logging_es_ops_allow_external`, etc.
* Merge pull request #3911 from ewolinetz/logging_15_picksOpenShift Bot2017-04-251-1/+1
|\ | | | | Merged by openshift-bot
| * Updating kibana-proxy secret key for server-tls entryewolinetz2017-04-131-1/+1
| |
* | mux does not require privileged, only hostmount-anyuidRich Megginson2017-04-191-0/+30
|/
* cherry picking from #3621 #3614 #3627ewolinetz2017-03-101-6/+0
|
* Bug 1428711 - [IntService_public_324] ES pod is unable to read ↵Rich Megginson2017-03-091-1/+1
| | | | | | | searchguard.truststore after upgarde logging from 3.3.1 to 3.5.0 https://bugzilla.redhat.com/show_bug.cgi?id=1428711 The list of secrets for elasticsearch was missing searchguard.truststore
* adding some quotes for safetyewolinetz2017-02-151-1/+1
|
* Addressing Travis errorsewolinetz2017-01-171-10/+10
|
* Removing shell module calls and cleaning up changedewolinetz2017-01-131-7/+11
|
* Creating openshift_logging role for deploying Aggregated Logging without a ↵ewolinetz2016-12-141-0/+73
deployer image