You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Elastic search operator deployed from OperatorHub:
apiVersion: operators.coreos.com/v1alpha1kind: ClusterServiceVersionmetadata:
annotations:
olm.skipRange: '>=4.1.0 <4.1.2'certified: 'false'olm.targetNamespaces: ''support: 'AOS Cluster Logging, Jaeger'alm-examples: |- [ { "apiVersion": "logging.openshift.io/v1", "kind": "Elasticsearch", "metadata": { "name": "elasticsearch" }, "spec": { "managementState": "Managed", "nodeSpec": { "image": "registry.redhat.io/openshift4/ose-logging-elasticsearch5:v4.1.0-201905191700", "resources": { "limits": { "memory": "1Gi" }, "requests": { "memory": "512Mi" } } }, "nodes": [ { "nodeCount": 1, "roles": ["client","data","master"], "redundancyPolicy": "SingleRedundancy" } ] } } ]capabilities: Seamless Upgradesolm.operatorNamespace: openshift-operatorscontainerImage: >- registry.redhat.io/openshift4/ose-elasticsearch-operator:v4.1.2-201906121519createdAt: '2019-02-20 08:00:00'categories: 'OpenShift Optional, Logging & Tracing'description: >- The Elasticsearch Operator for OKD provides a means for configuring and managing an Elasticsearch cluster for tracing and cluster logging. ## Prerequisites and Requirements ### Elasticsearch Operator Namespace The Elasticsearch Operator must be deployed to the global operator group namespace ### Memory Considerations Elasticsearch is a memory intensive application. The initial set of OKD nodes may not be large enough to support the Elasticsearch cluster. Additional OKD nodes must be added to the OKD cluster if you desire to run with the recommended(or better) memory. Each ES node can operate with a lower memory setting though this is not recommended for production deployments.olm.operatorGroup: global-operatorsselfLink: >- /apis/operators.coreos.com/v1alpha1/namespaces/openshift-operators/clusterserviceversions/elasticsearch-operator.v4.1.2resourceVersion: '1765346'name: elasticsearch-operator.v4.1.2uid: d92c93b5-9d7d-11e9-a43e-fa163e78af6fcreationTimestamp: '2019-07-03T10:32:25Z'generation: 1namespace: openshift-operatorslabels:
olm.api.e43efcaa45c9f8d0: providedspec:
customresourcedefinitions:
owned:
- description: An Elasticsearch cluster instancedisplayName: Elasticsearchkind: Elasticsearchname: elasticsearches.logging.openshift.ioresources:
- kind: Deploymentname: ''version: v1
- kind: StatefulSetname: ''version: v1
- kind: ReplicaSetname: ''version: v1
- kind: Podname: ''version: v1
- kind: ConfigMapname: ''version: v1
- kind: Servicename: ''version: v1
- kind: Routename: ''version: v1specDescriptors:
- description: The name of the serviceaccount used by the Elasticsearch podsdisplayName: Service Accountpath: serviceAccountNamex-descriptors:
- 'urn:alm:descriptor:io.kubernetes:ServiceAccount'
- description: The name of the configmap used by the Elasticsearch podsdisplayName: Config Mappath: configMapNamex-descriptors:
- 'urn:alm:descriptor:io.kubernetes:ConfigMap'
- description: The name of the secret used by the Elasticsearch podsdisplayName: Secretpath: secretNamex-descriptors:
- 'urn:alm:descriptor:io.kubernetes:Secret'
- description: >- Limits describes the minimum/maximum amount of compute resources required/allowed displayName: Resource Requirements path: nodeSpec.resources x-descriptors: - 'urn:alm:descriptor:com.tectonic.ui:resourceRequirements'statusDescriptors:
- description: The current health of Elasticsearch ClusterdisplayName: Elasticsearch Cluster Healthpath: clusterHealthx-descriptors:
- 'urn:alm:descriptor:io.kubernetes.phase'
- description: The status for each of the Elasticsearch pods with the Client roledisplayName: Elasticsearch Client Statuspath: pods.clientx-descriptors:
- 'urn:alm:descriptor:com.tectonic.ui:podStatuses'
- description: The status for each of the Elasticsearch pods with the Data roledisplayName: Elasticsearch Data Statuspath: pods.datax-descriptors:
- 'urn:alm:descriptor:com.tectonic.ui:podStatuses'
- description: The status for each of the Elasticsearch pods with the Master roledisplayName: Elasticsearch Master Statuspath: pods.masterx-descriptors:
- 'urn:alm:descriptor:com.tectonic.ui:podStatuses'version: v1apiservicedefinitions: {}keywords:
- elasticsearch
- jaegerdisplayName: Elasticsearch Operatorprovider:
name: 'Red Hat, Inc'installModes:
- supported: truetype: OwnNamespace
- supported: falsetype: SingleNamespace
- supported: falsetype: MultiNamespace
- supported: truetype: AllNamespacesversion: 4.1.2links:
- name: Elasticurl: 'https://www.elastic.co/'
- name: Elasticsearch Operatorurl: 'https://github.com/openshift/elasticsearch-operator'install:
spec:
clusterPermissions:
- rules:
- apiGroups:
- logging.openshift.ioresources:
- '*'verbs:
- '*'
- apiGroups:
- ''resources:
- pods
- pods/exec
- services
- endpoints
- persistentvolumeclaims
- events
- configmaps
- secrets
- serviceaccountsverbs:
- '*'
- apiGroups:
- appsresources:
- deployments
- daemonsets
- replicasets
- statefulsetsverbs:
- '*'
- apiGroups:
- monitoring.coreos.comresources:
- prometheusrules
- servicemonitorsverbs:
- '*'
- apiGroups:
- rbac.authorization.k8s.ioresources:
- clusterroles
- clusterrolebindingsverbs:
- '*'
- nonResourceURLs:
- /metricsverbs:
- get
- apiGroups:
- authentication.k8s.ioresources:
- tokenreviews
- subjectaccessreviewsverbs:
- create
- apiGroups:
- authorization.k8s.ioresources:
- subjectaccessreviewsverbs:
- createserviceAccountName: elasticsearch-operatordeployments:
- name: elasticsearch-operatorspec:
replicas: 1selector:
matchLabels:
name: elasticsearch-operatortemplate:
metadata:
labels:
name: elasticsearch-operatorspec:
containers:
- command:
- elasticsearch-operatorenv:
- name: WATCH_NAMESPACEvalueFrom:
fieldRef:
fieldPath: 'metadata.annotations[''olm.targetNamespaces'']'
- name: OPERATOR_NAMEvalue: elasticsearch-operator
- name: PROXY_IMAGEvalue: >- registry.redhat.io/openshift4/ose-oauth-proxy:v4.1.0-201905191700
- name: ELASTICSEARCH_IMAGEvalue: >- registry.redhat.io/openshift4/ose-logging-elasticsearch5:v4.1.0-201905191700image: >- registry.redhat.io/openshift4/ose-elasticsearch-operator:v4.1.2-201906121519imagePullPolicy: IfNotPresentname: elasticsearch-operatorports:
- containerPort: 60000name: metricsserviceAccountName: elasticsearch-operatorstrategy: deploymentmaintainers:
- email: [email protected]name: 'Red Hat, AOS Logging'description: > The Elasticsearch Operator for OKD provides a means for configuring and managing an Elasticsearch cluster for use in tracing and cluster logging. This operator only supports OKD Cluster Logging and Jaeger. It is tightly coupled to each and is not currently capable of being used as a general purpose manager of Elasticsearch clusters running on OKD. It is recommended this operator be deployed to the **openshift-operators** namespace to properly support the Cluster Logging and Jaeger use cases. Once installed, the operator provides the following features: * **Create/Destroy**: Deploy an Elasticsearch cluster to the same namespace in which the Elasticsearch custom resource is created.status:
reason: InstallSucceededmessage: install strategy completed with no errorslastUpdateTime: '2019-07-03T10:32:44Z'requirementStatus:
- group: operators.coreos.comkind: ClusterServiceVersionmessage: CSV missing minimum kube version specificationname: elasticsearch-operator.v4.1.2status: NotPresentversion: v1alpha1
- group: apiextensions.k8s.iokind: CustomResourceDefinitionmessage: CRD is present and Established condition is truename: elasticsearches.logging.openshift.iostatus: Presentuuid: d92f8e7b-9d7d-11e9-a43e-fa163e78af6fversion: v1beta1
- dependents:
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["*"],"apiGroups":["logging.openshift.io"],"resources":["*"]}status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["*"],"apiGroups":[""],"resources":["pods","pods/exec","services","endpoints","persistentvolumeclaims","events","configmaps","secrets","serviceaccounts"]}status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["*"],"apiGroups":["apps"],"resources":["deployments","daemonsets","replicasets","statefulsets"]}status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["*"],"apiGroups":["monitoring.coreos.com"],"resources":["prometheusrules","servicemonitors"]}status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["*"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["clusterroles","clusterrolebindings"]}status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: 'cluster rule:{"verbs":["get"],"nonResourceURLs":["/metrics"]}'status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["create"],"apiGroups":["authentication.k8s.io"],"resources":["tokenreviews","subjectaccessreviews"]}status: Satisfiedversion: v1beta1
- group: rbac.authorization.k8s.iokind: PolicyRulemessage: >- cluster rule:{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["subjectaccessreviews"]}status: Satisfiedversion: v1beta1group: ''kind: ServiceAccountmessage: ''name: elasticsearch-operatorstatus: Presentversion: v1certsLastUpdated: nulllastTransitionTime: '2019-07-03T10:32:44Z'conditions:
- lastTransitionTime: '2019-07-03T10:32:26Z'lastUpdateTime: '2019-07-03T10:32:26Z'message: requirements not yet checkedphase: Pendingreason: RequirementsUnknown
- lastTransitionTime: '2019-07-03T10:32:26Z'lastUpdateTime: '2019-07-03T10:32:26Z'message: 'all requirements found, attempting install'phase: InstallReadyreason: AllRequirementsMet
- lastTransitionTime: '2019-07-03T10:32:26Z'lastUpdateTime: '2019-07-03T10:32:26Z'message: waiting for install components to report healthyphase: Installingreason: InstallSucceeded
- lastTransitionTime: '2019-07-03T10:32:26Z'lastUpdateTime: '2019-07-03T10:32:27Z'message: > installing: Waiting: waiting for deployment elasticsearch-operator to become ready: Waiting for rollout to finish: 0 of 1 updated replicas are available...phase: Installingreason: InstallWaiting
- lastTransitionTime: '2019-07-03T10:32:44Z'lastUpdateTime: '2019-07-03T10:32:44Z'message: install strategy completed with no errorsphase: Succeededreason: InstallSucceededphase: SucceededcertsRotateAt: null
The text was updated successfully, but these errors were encountered:
When we add redundancyPolicy: ZeroRedundancy ES cluster comes up.
Available Options: [FullRedundancy MultipleRedundancy SingleRedundancy ZeroRedundancy]
Error:
jaeger Operator log: jaeger-operator-b4bcfb56d-z5k2v-jaeger-operator.log
Versions:
jaeger CR file: https://github.com/jaegertracing/jaeger-operator/blob/v1.13.0/deploy/examples/simple-prod-deploy-es.yaml
Elastic search operator deployed from OperatorHub:
The text was updated successfully, but these errors were encountered: