From 293dbbf7b2e6cd72abb1f9bf583b18c3e4c44d11 Mon Sep 17 00:00:00 2001 From: actions Date: Thu, 18 Feb 2021 20:54:15 +0000 Subject: [PATCH] Merge pull request #1000 from cmurphy/fix-rke2-logging Fix RKE2 aggregator DaemonSet for rancher-logging --- .../rancher-logging-3.9.000-rc06.tgz | Bin 0 -> 9536 bytes .../rancher-logging-crd-3.9.000-rc06.tgz | Bin 0 -> 26812 bytes .../3.9.000-rc06/Chart.yaml | 10 + .../3.9.000-rc06/README.md | 2 + .../logging.banzaicloud.io_clusterflows.yaml | 765 +++ ...logging.banzaicloud.io_clusteroutputs.yaml | 4563 +++++++++++++++++ .../logging.banzaicloud.io_flows.yaml | 761 +++ .../logging.banzaicloud.io_loggings.yaml | 3536 +++++++++++++ .../logging.banzaicloud.io_outputs.yaml | 4557 ++++++++++++++++ .../rancher-logging/3.9.000-rc06/.helmignore | 22 + .../rancher-logging/3.9.000-rc06/Chart.yaml | 20 + .../rancher-logging/3.9.000-rc06/README.md | 129 + .../3.9.000-rc06/app-readme.md | 22 + .../3.9.000-rc06/templates/NOTES.txt | 0 .../3.9.000-rc06/templates/_helpers.tpl | 66 + .../3.9.000-rc06/templates/clusterrole.yaml | 167 + .../templates/clusterrolebinding.yaml | 18 + .../3.9.000-rc06/templates/crds.yaml | 6 + .../3.9.000-rc06/templates/deployment.yaml | 62 + .../templates/loggings/aks/logging.yaml | 55 + .../templates/loggings/eks/logging.yaml | 56 + .../templates/loggings/gke/logging.yaml | 55 + .../loggings/k3s/logging-k3s-openrc.yaml | 65 + .../loggings/k3s/logging-k3s-systemd.yaml | 65 + .../templates/loggings/rke/configmap.yaml | 26 + .../templates/loggings/rke/daemonset.yaml | 126 + .../templates/loggings/rke/logging-rke.yaml | 69 + .../templates/loggings/rke2/configmap.yaml | 18 + .../templates/loggings/rke2/daemonset.yaml | 101 + .../rke2/logging-rke2-containers.yaml | 63 + .../loggings/rke2/logging-rke2-journald.yaml | 63 + .../templates/loggings/root/logging.yaml | 59 + .../3.9.000-rc06/templates/psp.yaml | 33 + .../3.9.000-rc06/templates/service.yaml | 20 + .../templates/serviceMonitor.yaml | 30 + .../templates/serviceaccount.yaml | 10 + .../3.9.000-rc06/templates/userroles.yaml | 35 + .../templates/validate-install-crd.yaml | 18 + .../rancher-logging/3.9.000-rc06/values.yaml | 149 + index.yaml | 38 + 40 files changed, 15860 insertions(+) create mode 100755 assets/rancher-logging/rancher-logging-3.9.000-rc06.tgz create mode 100755 assets/rancher-logging/rancher-logging-crd-3.9.000-rc06.tgz create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/Chart.yaml create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/README.md create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/templates/logging.banzaicloud.io_clusterflows.yaml create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/templates/logging.banzaicloud.io_clusteroutputs.yaml create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/templates/logging.banzaicloud.io_flows.yaml create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/templates/logging.banzaicloud.io_loggings.yaml create mode 100755 charts/rancher-logging/rancher-logging-crd/3.9.000-rc06/templates/logging.banzaicloud.io_outputs.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/.helmignore create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/Chart.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/README.md create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/app-readme.md create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/NOTES.txt create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/_helpers.tpl create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrole.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrolebinding.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/crds.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/deployment.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/aks/logging.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/eks/logging.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/gke/logging.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-openrc.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-systemd.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/configmap.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/daemonset.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/logging-rke.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/configmap.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/daemonset.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-containers.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-journald.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/root/logging.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/psp.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/service.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceMonitor.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceaccount.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/userroles.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/validate-install-crd.yaml create mode 100755 charts/rancher-logging/rancher-logging/3.9.000-rc06/values.yaml diff --git a/assets/rancher-logging/rancher-logging-3.9.000-rc06.tgz b/assets/rancher-logging/rancher-logging-3.9.000-rc06.tgz new file mode 100755 index 0000000000000000000000000000000000000000..6ccb3d7a96f5cc9623c9acd93401f553b7b112c7 GIT binary patch literal 9536 zcmV-GCBNDqiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PKBxliN13@BX{|6n!;0ckMYA^_YjVx|LhyjGaBM^qCG`fFiG(b)wZ-KlYu=$)u^TEl2 zaOti{82shl(r`E&9v>d+e}}_i_21F>`S>rR!{O-Q=xFr(_~0+Y(c$>;_%ATLKN6Z# zA|&B|8Q!_AYUjR^M52gEA}Nc+!~yV#BmtYd9+5IYm$Cs#B4SsEAA7HGU^#L~9A`fd+`qd+$4B9D8cY4?garY5QUHm3n9)EY zS2YPp1dZmfpz}qr0*^&AI!`#61_&o-FNF)I>>4@xFkQj-y2B2@iRyDY2=G2eP9)>5 zLp{~hLdsZ71_Mv23E|ovYB>=Cr5FTk&h-B^8^v<&T;b}PabHZFe%8M}ge;Q5_5ac6sMG(Ck@nyv z&PWnSFe48$#?xuqXW8uEgAWTTfC?b+?-y_1^kh2Q^hoIS;kIAANSXdw|s$*ybFy*;HwlZx9SMvu-`;M*b1N^8p?83ag{2vQ9tQA6pm zNO+VbLRalA81+y~fLy3%kh^BwNgx=|NRcW~fVUu#Xa40<08b)d5n!~WoJAozRYb9ZN2umS3A8wp1xj2}h}MTI zT&4KOWOV=l(upvE-m6~|67=*_J*y|s({-6gIGdp-C-9D)dkgfF03C)FMm{2hzVL zni{!^aRMg>V7)%o&%E@PA~Hh#Y!6=KvrLIdZPftPxoFD1AyW)C6$^9*JA2{70tG^k zPl?w9fl|_FEYul)9cls@|urqv}!vX&Ue+AbFxV z8jIMBZ}!4!v^^y&2JW4(Na8063l{hSV&?Y)Tw;*HK_F6cI!&ZiU~2xeNGUBzXoNf) z8Kp;!qDsd@kr}ZFIAc;PGNX_Z>Z=(!)YZ+Y598r*=>BzoIdV^#U!m)-hT=Unvu8Q< zEzeV*d14@mxDtaDU}Il(C8KhXc1J(LPjaBNe!SM4mc2bt+Vq8Z$D%XFq-AIN^hbeQ ztCXR7G!y^eEQu$&6OO2_jVLvF%IT5@ILBAQBLOk12HQJjX^H)rV%P<;wt5@rf3C zAaKfAh;o66$Sbxw=B+6MZ2Aj&GS?^ed9B!K&EWf5F_GX+KG{JlX342{hFS+GdD4hL zz2TK-j!%WE_jKu5{y2qN&E!3|RzzW#D{Q1@79<$SDU~J%DA0AG<$nS_8qHYGJ`XXx zm?pCs@(XQ|CeS;2`+d(;KW?c1>OeHMoJr;dMspe|>tKf5SCx{hrjpqBX5P?G1GS7} zK~IhgjsYV++Ci$rc)!pvr2a~o!8) zbqee#W7^UPR^e_1`efioVW&Q40lH;vtVEl$AP$H{4LJZ(vo)PkH3+Ch! zp_fQ>9AjCnUrh#fl9Z==F>S)OOYwe4lw&$dz7xNx24!s~*r<2{OFY zdB9IIz=8;CtbK)JYwF0_(k4^E1}i$?Q>AAF%s30nK&Jp2rYi$|e z$ftyRYVpqX0@XUBvHeus(pKzB5c1V(9sJPR`g5iniEkK z>OnuxrtOz&b{y4`0NkI9_qphIgBzu~BM*)b^q(|5Pi8av33~m!GK_rvw;?oJM5JxZ zk|0>YuL%kCZj=H@x(lxJFEq95{8F`{x+7qU9!Ug(U?IXkGZtc0WS5utBZ z#ZtzNX82_aXS9}{?o43JX(VUR z`!CV|FVU;iX4>6F;F|t6f_Q587PC2{eaHE%$woT^$_jZK2a?J(O=uu#RHjnb@yucT znc|t7paw^H6OUmv^7I%Bx?EuoA_Cp*@Y>i zG?LvPRMRE(wC60=3-~s@*4cZFf>M-Y^S9lSg&VcJ3seVs|J{S$MejB$%ec0T7qSJh zCZnm1#BpV%VzyC#|2@OnP0H9+JYQfCx?*AWbhi|y)ou;nhgipm(bZN(!yFSt)I^|IPT%I^p#~_-@<5TkzlEX!yK>|DGRp@js7~Dsrq> z*{K&uO^ANKUy4T28Au`*jMLw=XU4ty)=b!ub44RR+sip)0XiW{;uA@<4@4<%%AyZ6 zL?KBSPasNyzyZkgRVsZOk&RY9JPA;Tl#rNeH@Mv!)1HmojijGteng>v3bXC&fHEA@ zG>^6{`cEGNw13V~>VE?&%pb9hb?QSB`)Pq|{je1&82K@yku;QKmeT%YK32$DBVdQN z)Z$I=+{q;ik`TRs(9pCLGe6~p)`P_JSdvm@pFI+T`hZJ}q_ARC!!rH4k(jm|BC#I+ zO65MmkVOJ**KIgL_FG6Iah3$)G33Qk*a!S1F;dg5j$j>D5N>42eGycmqYn|vYsRl= zG;bU$8qGNh@d&b0p)J;t9yN1-`RT@(&O+~#v_xzqu|AftMm^=hg`)U?B{EK|Am%S^ zt>#CbV5S z^S05VHnLYivMG)HObiOotsbl9NMGG+R|?4cbHkV}-7>Yp|5lW4yA0Uo|9}3x68||K zjYgvm|360Bg8%OZ|GzhKQ(6Vw0_$hdSI8#KW24Mqx9f0-4)vaiD0CK&(asG4vp5nl_ z&HwSZdj98lbTI7Z|6`=e{I3f}&U{K-M<#p|6S;T>-%M8$1x&sJR|k!`{|ML=dP-^r z`&w>##=8dJq#00}!l_~@;D-)Me5TYq|MQjRUA4g0{oms?|KGv$&j0r)sc76u9E;qJ zzs$zJ-hMZmx-~0#TN`;-!ylt(kCJGwj@bf8kxt>{iD^p|g7Luwd)q)!8{u`=jh3cb zHgB6iX51%fv}!gOg~)aL>%OSG4V?yA=s@d~%Y|tC0td=xPEArpCHprC13iwB9msEs zRi`FGN732AHE#+gY%S6_Z@4Z9`S@hTbXJ+#lEWiU zMQ&yDH$B^wb8j>**A_D_D>bDoTSys~UKBWd%IrR9+Lp@f>fNM0obzf8+| zeE#p%E>+7ncdSMti!)&DY(ZYS1sOHPHw$R}tSFvu%GbHtLX{6P1ukl;4_cRW0-`hUjb z&j0f$sUmz$LH{nf5=Egb!p8c|f$W|HgC^5k9crOu6-)HVl~{v~^#Mco1QG4Qfp@K1 ztQFtCGxe-0Sf z0{_jg@L}=aQT6`U@o3!L|MxhlE&iKd;UnU|`4x8f?_u%Z{0f`!-&Hcje$3gYRp<5V z;9dv!I=I)ty*~-uTT3nQ-_=3(qknZElu?biw*wU1g8vRjqssj+LB+4KEYqx6{y}e2t6Y|y{8WkBd-oRH{t`s$g6`!H=-K-3_s#0$;nUp9P(Rz z)HtoC59yWHdC5GM%ts+5H<9Ul3BYy?9W(dJk>1Lan>E(_z;R zyWSgiZ6$v9fMD;bofbHD_m;jmG~1(UHis1qs{_pUAhyOeL-{Job|99!jNiFa{zrsOwh2m`@K(^rj(c$q?HU8u1u)F{N zQBvFZ58fRAk>C8Ih2$-XTcUHWqde|}yVFMU5AtaHG=Uqft3IB;I{WGM$*Z3;!1#vE zFW%^{jHRhys5bUK2PN5;nsQs22FZ$xA83HqR+%T7Aah3cIz1#8v)!MgvsbuFzDh;TOT8?DfmK++<%z>1EBEe1m-O2EF1(4(f=>^KR&#HR!b!)V(X0&SBL6r8lUctR|{vbY6KS zlBub&z6LY!HS$^=yaf}6v{L=?4q{ddw!B$gIjKSZKQWktVHeEZeo0@+V zscTF9x=`JUb14wLEeFdo=%p)@G7Xy*da9c0u3p)}2t1_w7oe33_?Gw7)Z9YV%71m+ zTYgIIRd1fn07m8N)(1uztvr>txFvV(>li!GZohqDz8O%sOT2Uue(u@R9ZKJ~7Tk(o zu<0uO!j9%TUr|X1U)mUYi8NiP833q&qXInL;(2ewf89$-pPx$(`wVCT{$+rC~p{VKb8odh_6vm|;UUPR{e z6dS*_o`2=NzPP|QG)g`-y-ngczz`!zf}&Pf%UHl${oFR1?`njxT)ouDC;d{6{xdb= z-KD*MuGG^1lR9Mi)h#{-wk`f=yypKO4~L!q=TXu<_Z ztmZ0^Y#*V0Tu)8Ko8x>o7Wi5Mf7S`ALq3+UojpnQu{2${tL|BpuN z@qfpM2i^RCjC3FK|Ly@Ga4Wl^$$Qz17eccU8Wc8fdz z&6k+kuKx-fz~jQfkXEa~E$hF7=f~CWe;pol-~W1?bRX-#huHuwidoCe;Q#2|+;P)2 z429UKeSU@ex4e|C7=pEN-?l05*Ro~XZJ&1Ar``5xw|)8_v3+_g{Fg4bTJ8mGi~m!9 zSML9Mel+gz-(#dN8ULkX)}g;!pua|c=&ty$v7$y4*rG&-1v@O*VZjayc3AK;W5G7~ zk1=_t4}fj+{~Zt4;=c|Ly8B-rB|R*T>ke_;6Y%@u6mNI7p#x+cAnO2G2gvRNkbOS; z-;Dp15Z&r?uWM-w{u>>QE8l+|9S?_H{O_YA1-Q!B|LZ`bRC|;jR@BP9#Pp~-t3YoJ zH8w-SET7TO4giTFCX1>?py#nLc2f=Lk|16X_bQnpk5Hlx{{CD0>TTdqp?WcCQ~kZb;w@1`aT@XDR|1_jhC$@?VNT_6sNa9L%KUTB z=-pDY{Hp!;sH*>u54!I^K1$jYzg)k@Z&pOJBnVWtOc&o?i{FdlGuOqP z1c{KyU!N8iNSR?h4^AFOK@G+t)3Q_0(_40ROeK$ zQ#8(*WF8A9@ZsdtJ~IrrnaU?yNE}xTOpDPejZ9q~G!l|Tb#9X`X7f**w(9@4EKt)&BV>;b%rkf4~r}K{ZA&q)Y`Pzc!>eEx3*q6+doj_0W1UDTT*2jYDLl$Ze0IU47 zfL)917fWQE$hAYjy5jxybF25qo+ZWWd*RLw1y!53DTh9lk3JgOwQ6`-&SW2M7`Zvh z?C*ez{KvI|YyY8IzBx7P|0M~iuY^GRg@T~(@g2VTT})f||JJ|%H16*IeVnvs0pMK1 zlK>-l5-@g^#L(NM?RwBFXu2Ns)PGN(!Vvm@{Ne1GK%E&&A|EE-flobIcp*@xFB=p_ zx{Wxnjr>z>(px>G&xwbr;(O?M{6hR@xpj;4O-EiZ6SNKB?Qppv3+U!1_$RK?CZ9-lF4b}x+^06*Un^9VvM6&0c*jF9i^e5KtT(7M_#HclIDsz>=~Ep2Ygf6!eW_?|(gY;e8aWfJM5bA_-#T5YPx+$9;Kz zaV{B0XAe$T7_ta{IyncQa^bjhDhK-ihJ44J{>BIT|LKFpe4zf9{uIk-kXJM%p0ao| z8lZ6YU2z>d`|gxnIs2{*V`u;WIeYLE;glr;UcY=L95?3d7xbj#QXk2{f-+&B{_R(L_eg?GB{B-&~ZLi zU;O-JA!RHkgTb82MKaZUJq3(1sJh*r!dnuNIr`vXBsmG_Z|JAT48UVy%p#0r8c(dl z(DG~cAl;A#7NrY6*KzjtKnDNE=M%@dyu6$ev2eZtWwmrnFA(2{0!@7($uvMnDbKgO z``Xlt63FscSgI_E)e0zml){Sj>eqU%NYkXgjwEM(;whcyI3F^I0aM1LketK<2xP2& ze|uK@7zb<>Dt@v^)%nk?tERS6?_J8Crc8xI82p3q@qaJ~^Tt)TU9otY+5iakc-mn& z<)~4apb~}S^dWB%M((%&Z8ZD$C<(kceJ#NHl`UTixC>K}`@qWBO>;`uqJDA{lAygQ za2c-p_QB=4D5SOY`#N);cbCE2(+Jb~Q6OA;I_mi(5t4;x)|K&{MyZ#EK*cy%9w;kH zmW=u!`AYYWfhlX?>Ws5ccjnULzPN-L3w-28^7X59{S8Fwd_vJLX^5^8ABAVbP~|qm zEnt7YI!*WYl>n%+h4Dy-I%8(~sVx)1mY8U47gQ4;OV56OvRC^36a;E<*6tOdD~kyy zAxh-xCz0Th2&S0TjXwB^UOL!uF^y?K_%WhQqL8Go20jKT(eSM>?gg1&7Xe!)&u)gb z$U}}HTPjuuL5WwXViG`vU>+qhg(<;CN+Lpq)d`|3z8Zs zlWP~5H&J%r{@oomHdUY~PJ+OMa_`71RnP{Bx1#9v>>ZP*90f*ly(vwRQta=S$T{_~ zC7W&_EnsX2n*oXARs}CNH=!v?H#K*lsz8w{-JYy=6lJ@m?MbTe$eftGKZ>ripb1rR zt8u%5{OG1+#*Ys(##7+>KEthNFKfD4Zp1Tk!JZ&s!-fo)m1Y1YY8dMhMpn z>Mb;R2F{%_-?*iPw?ID$&9GdmdSe3T3sTTtkqtB5_xW3P(njVaHE3 zmU)e$qN=c^in=>nw7Br`t?|dt*iM=x(;}X!eekp;w{Djdt9ra}#;G^43bmIViRw*Y zG#n0}LC>Ck>P=ug91j1m=uYg&#R`^sYkoS+c(;A zY?i$uMvu;@)dOZZriZ7pMz+i2n6oAImAPK1Dk|$>vl9hBFb?>MgmHkoxHbUC;p z;SMgV{|o#3A85S4KY@R9x?C(cR?(b(^ytE}Qb9*G2bpSLqRPY-@*|iixZ1|LRZp{OiPN|(eaRbQ_ z2O&|-4vdd+El=uhe`-hhEAeWkWM|&Z2laFGGe_|je@Dl=+w-pT6}9sf$w2J5NQ4`B zWdo@{ygAoC$0VYj+5McNyheRGN3J*D#N zB3mp7NB^JLa%Fb|=eht~;VK*MNG}qe*kS8uoOoI)_)(E&X+ZzywVJiBDZAOHwN&1u zrn$Js)~+jU+qjtDMA4?LEKJu{Y-rYn|<_vdJZ?-EW<7AGPn<*0Xw?;d01DE5`Kj@Ziod$|* z^R+t|n<+8{Jyo!VqF%4JN%z_q#cKQ?iIuPsKg9cs0o)S*dpJBitj7NyA9eTtJWASw zGa~`n#lFQLH7a0A1p2^cv((j)#6of;A$YdhU5>7C|h61-n)?r|!xb5}9y(1{`O|)f<*@_^241v)|6`ob~BP8J1)B z(*UFF;|$BOdo*}zypY*mdtdjp;Hb^}rTf&-hi7&OY|xuNzL)x+MD|+`OBA6e(KpoV z1AU4&8Jo-_8&G8)wxcNmj3njRu62c^w1J$o`XY&Dtwr%(!VAr>mZIAmRJHJyn z*?1vWF^a)c=);Q=VQT6T9ntXQvTzLQ@~PQr@byNYfNS+bcfBBXS&U(s4R&G`8wqXD zfSG6ccE4U-=PPO=icZFSlc~rZb13OP`C~?-mP6)M4UY^JRW8}dVE@M}%|#jk5^quH#*A_ENVTO$|K8@r+GMCsg59M* zr&|}Inumpf(jB-*v0azfs76rlB%!*mcK1-BaWlgC_-;2Kxmi@@jOSCC+JYs?Uf8oB eU(sonE_JC(UFuTX^#20@0RR6*4{vz@Dggil_1RDW literal 0 HcmV?d00001 diff --git a/assets/rancher-logging/rancher-logging-crd-3.9.000-rc06.tgz b/assets/rancher-logging/rancher-logging-crd-3.9.000-rc06.tgz new file mode 100755 index 0000000000000000000000000000000000000000..33519f7624000923f6285e1bd0097acbabc0d299 GIT binary patch literal 26812 zcmbrlW3VM#(5~CP*vqzU+qP}nwr#tYZQHhO+qO>k-usJl;@tb=M%;?1j2Ss<#;ll? zW8^b3-@=Lbh4|y|@lE!FLQhnl)<9H>S<;P-NuNQP)=+`TOkIJESw>lzSxUvyT+iCj zO;OHc_>WM#4UGJP+i18#l1QUZ+RC`XG*suCh9Nq2L$2Ex)|Dh<@zuCekT_JPO>sxhP(jHwws-vsJ(QJ+PA_V z&_m#r+DOeh+Df_-1nA4(-y}v@DRaoy5QFEv=w5H{VKe)~Gw zmw{#4NYxtWj-SXC)>2?RJ?f;h*HP%0)h+v2ByN4G;du*VXjDY0=TIdm?asjE$|K;C z+x>bF+Z``wgX7UCs3$t#QVY6R)#)lh=7k;P;d<>^u)B=8+N&UA-n2@KF|p$;!la-_ zjmcJAkr!<*(=Od#cfswK<$FO+8;wuEG?^_y-Ydl)hC75>*@HI|-={d}!VjPO8i3oX zW>kI@G9*#66kv^Bl^Tar?{9^bD!SmE)K4(jPLD?~G6E)>9n4%VTd14N)!@^=Az|NR z`mih;;NHJ=uD9EcKIKscUq(X)zvRx^zpCX`pPP%jKPWF~V}zT6$LD1hzIB7v8sgIv zva7=L=yZEG`gj(kPdOg*f2ggh4E~l_uPml=V(Hg;0u^2Stkg=20~oG_8GkE#$^Pyn z57(d;TAZK0$+zb9`aUY&?)Fx(&OPeKX^(cA$FlW^tirks?%#fju*`%rcX)B=W~~j0 zb{RYkaDS8`-Q1n_FyCx0?RB!EDgeAch!MiWTrlx@$cL<4C_At|OIb_b(TM&`TqRK%3DEKI9 z$^6g|acyf3B`2#M>*G-%64{Gn3_C;nR8aFloY{V$fc*_gqP9eUL<1t!7+$TJUcvOQ znG;?2xlrMlwPT6=)Bv-chTa(Q$mCF0(*e_L#=P15r`I{s;8}CPNEZL7<|!Osywbhs z`mb6x5W?J*-tl0j4d8|J3y0Qo(BMwMwMPFO8abRnVP>y>VlYaf{vLK};@9!UvqnF}jJPEQYRu^-isz4YMJ)@R1q_Bqelx@yhGm!I&&TcJCmHKo$(~8k z3FR6b34u=R@}dP52P)Vd@;@F3^C2q{z+`g4b&5SpqOr z{EkTNYg=_$dxqDx!;)N4j=1NBMnkquF90Aj-}T(4(PJesg>2M{Ez!*^X$4en8uGP= zwB`fu01XF1VBBB~1Am&@wNzt| zZ#$^NIi@$@WE~6Mm4%0R8|cX_?eqgb8{(?@>5zu@TmyKoVNVgQ8YjeGX%N1V(*H9! z*%>M55M+2oln%BZjb0al`GJnznXd+e4wNJAuD)G#1$fvCmxs6e3FWQjbejp7)su@A z@D&Ejpn9ViR{6#07t%+$_bvNcB?+%%1& zp0sv%1d>lTAdBUA57y&=AZRquDy<}y5cfEY_@y%jMQlc3C{sDiR#k}TC#zUfZ?$QB zUp%d5M@1kGg}fafh6chET?HMhT4et;x0a^_)3H#>1-|fwrxUT#4{0T{_{$^LQ5H0I zwMH?W48})dEFOu$(FxZUeD64YEpWk86~Kx&^xw; zYbA}V9;)VV@|qE-PubRW}6$St1GbU>JpuB*mkH1 zcq-zgnaq}OD19O=uY3KdFg@axm?+>Au~$xT6HGKgh*x@iBb80od@aMQr-!r{T2x`i zfz0DodgTM~7Nn2F=6(V_kgM&hsR5qaq&El^M$YRBGemP1+9NU4~FH+Hk0MFreWI#oNX>`ZHTTSC*9P-L%1JdH%5H zyJLwuv)78$DE<4IL5fCi0=?-xAV&%pvGVR{Ha5gqRO30c&sm5U7qYy^N8@|)5ptPI z5W}VIxNau1C*ZygHcDCw5hHY&4mR3`Eb*m`&)Ii-J#Z0?&E zPwG|7b@kVF##>DPSGbBV!r&d{9K%Wi`n*kgj)3RjDDJ3_Srz#y;t_dbpNEZ z;Dt6<`+lw`kL|bVVvpS~Mpr$b7msy^k!Zw?2vm>#nEFz(KNmFfOLrJ#B&@Dpdvsr0 zLQJ?Dw<>qG+!P<(Sn}O8?`APnWW?-ow}6e%d>)d58`jN*N57RjZF^Q90XexOm#vjw z-qanM^L(}KdqTPI2l|se8n+@j?dBI`y(2k{n=8v7GMCkWA&|-qku$e{C|LOT(-R7c z#CGVHFR3;!)Cf=5iwklEfzKX+EnUQ&uIGAEpF`tyH_IWCB&M;w-F2&*>TOuVFA#$u zsb^uAqyO5-YqtG0>&pNGd4*BQ`$(4D?v=l6fh>NDk@@hWeF?<+b2jugilJxW!<(Cm zlmBs%{kST1w`|VI@pM0-e#VSvgOk!$5;D|b^&}MD7M+iO!|wY~=;L?LyAARlO$0iC z3i!&inuQ-QKGoi~D-5FznQ*MEr39uR2XzYTqY13=j5~0dc|$5Ur+yzYjYLgT_x;m0 zul|ODoRVIRcNN(pv%J3*O&k}nh7kc6V__f2QI+j>%_#}pD2W_(_{eZxl8$V7NZA`d zqbOtQ{jcVxNDYk^2|4E0(3%U!zcm1>lTzwU8gm>r(yWna|Hu%^KG+$|X^l35MFf8G-2V_-tLbUWqp< zN$v(%&Fj4K$+Wx;$B8*Jc{@H0AWyg9GTPvAuGwrgFpccuK*`+cT^^9W#|}`}5p8vU z@Mkk?c!RJ9a(tdca;Qrh)-mwNH!1Xz?Az^5G)PE1IGrs;~;^fI$PV= z)tjdqE0o7|4zY-*A*qg7<-ktZq%&BY?v0w z75$W};6820W$foG^$0QV8|Erd5ytF{nNCW*-qxzLdA^3848a>d_J8-3EW(B%8H(@} zfc8@#3_lMy6a28W4_4cTzBB$bNwV6|ooL=-tzh&)yh!D*%jwJ{ra{$Q=?}w@18Sdk zMWKn?VqhW)8Os_D*{!oL*9@J!FU*AI=S1@!zR?Ofj!!meD$x@J^PRssN-})^5{&LIdFDEMr6R6*dR&h^od|m(5)_lWQ$2Q*?R161|`6TqUBvUhTA|vd> z1BCWDZ##05&2C2jmN1(g`DOT!{kCfHfKw1Aottb6aax*G7H-w(q-NYyrZ2F1^uaQG zws=bHTQvP8=sY%qVKs*`;opjc<~R$* zT;AW|DG8W$#sV+{e{qLtEx)R$hWG{f0Gabxia=;J z!EUSZ2U$@;YP`O9I2l=ySpxB3BBFx4q!?Z1+o}gBt_$dJ$Sf3L2Z?`Y(uPK6R2AoG zTX+>`@jnrR(tbx-_~TF&Y`zF$Pfk#0ApgHeI+8nJW8Mty2o-We{~KD zjO8}Rvsf}Ekb*`%hjbABCg-S>Qn`PtDO$bD=#A(uVrKpI2boPANWfUt33J~UYRy)9KeK2Eru z6n)m022A2*Fekf;Wox?!9diEL5IJ&3{v%GIW`Vaf$$!o%j{_BfUGD=`{yzM+aeM@s zzKb&&pVCzrBnRm{F?PvN)W^W^8yed(WS&`Rs+Tz|KFv(`;o-)EN@%OOl5W#w@{_W& z8G$FFIHtR_@M7SGFLvq$zU{IwB15VE5Sd<3xqP5)U83+{=}4?|X>2QkTBYr58^wI- z{m<@>UEmOPd-A;5%H707`80kLEi1PQ6Sr*`zr5QL>GXe9(w?Bo+V0-AHPC~ts4pn}IlxO+ z7i}^ScNQ_CkZEoUQPiz~N^&z}=;^y;Jd#~W;Q%~BCycP-3Wkkj)xq1z>14=o-k*iZ zLVfIgAl*Xc@CSQOJ#Pn%%QSxpJSo$R$b(>+_*%e;4)R)SNGb<|i(NVvTk zXsjW5j5HPerD;`b%T$YF7}l!-iWF_!ii*It@@2<9GvwrA4ZsnB*@ny#{4vQ!ZXtvH zF%ynN`JxdISZ{kmun$B>ugP9N?Z(@E`bojK8J+~Fg4Swnhf7~I*%>Q9nwE~Dv)cuM znDXt1AyO?sUO{sD>!q*<-XI-$Ch(OC|C6QQ7V*_w<|4BlkaN`fr;;I?C=`HLOCh zXgDuTPC@7F%5NBJT3~BW>dYBaJXzaR04#&T7Qz$=@EIcALFso;L@r?5b#Ge8Ua01Z zW%~!!G4&Y%A3Cg#%ZitWs5djmMzL^5>rvWcNrGzXzQk_Y18&)3BMMsd(ryhA(tm66 zZ-Ffr-)DI5(S|5moAFKVFd|P>l910hq^RX&D0u4W4jX{8#|3)H!T!iS0lT0Ck33cd zSB=~GnHa9I)8Q8!tlG05dlk@YzT9Epv(;80;BefB+B%m#H))j+;xP#s!VAoLVqcL zKCv%5#+B(ZAQ!IM`+o`_p&?himQD3Q=Qr@0&&a<=v+?sWyt!ReuYD4dp_u!&_KXIF z`3@)LF~171l%I(c+zG^~)0{f_*eM!}V-DN93vc+qKf`(WcLM|kQXp|Q9LSoj&Xo)X z8onW;=NpkxNkNO~`uch}8PaM@o7lnt-(7I-7Z9!=nbueaJh=WLf$_U7KQ$)djp$d? zw~Cp`C0ERyPzSh0xZ~f}f0=-b=NRA2q7JSTZu*Y#pJj8bKJbhSt`}nnepzyOf&dSc zA5m0!Dz)~0I5LtU!{D>lF5hQs5pii?&w8w03l=&Gf)&~0Xi}qC%`At*RN1OE0CL^> zf=gx@F+haQ^*@usY!=?zFCDFaLka@J_FIM%#HNPSv0xvrtk1*2lZS)4kWm(ja;DD5 z9XunJEMP&F-bnJ_Ror;&htltmTtZFhCr$BFL9)!~b>u4%Gv=JEz?dm4&X>9aP!Z-x zQ)%*JxLlB7imR7}_j-Tv08g0S0{pDrUwrHr@}~xZ%R$+i#;zJuBM4b3Y!fHeiKEwQ z#ZtqDZ*6#LHh|+L_p2mv)J{Z-_5fzxT+TI`S)Xp2zspOhiMuYBS{XD{XQa==Bx9`7 zR3RCKcX)x#b%|0CL0=G`T?+0w)MLruF}D+V6*9JJ<>ljcZldj6L_{S|hVyz+OBMxy z^=d^Q}G6@^l--cGBs|18FqdU}I4~)2$ zlutqrl)hx(FRdaqiu>X1VO=|L2N-VgEaHR8gMZnPSvB#_ErSJrE?+p38m$}`o!tuO zM}EE_wxD&f7u@)tT3>MV8t8DHXxDE`LDPW>&VQmWg1(#%P?*(6gg0$sykqxya!W@@ z6Ysco|9n#|mcJt2(fg-az6+Z<3tL|-0px$CKK%NpNE$aHgjCha^*&XhEwW5ZzG%LXU4 z+nqD9KhMB#%0@#Y0*OmU0(ADvbN%GCPgpb>7qpL6dy2F!;Qk6ILWn1-Br2$CHK@a6 z3O$lA#+TcQB#&wFy&8llXHYv;nSZ~C`4lP=h2QB_0}U`SHBQA*Ac7*X=ZX+jlEj+z z56wBLMY|k;Yg@PGAa*K5kw{o{VL+!(vJ3RQv2gsc8{zG@|^Oww2&ciTQzcw6{g z+C(p})hJ&kb}7_q7;f|Omm-C2&MD(Lb8P;T++o|H3SO}@8mGUwU-C8aJXXMfl~-J* ze((_V=H$0FT0u>if?brrOG9H+s`tM`T=kCAZ0ABNNjvk;-t}M#ng5XmATXTjAl{bmb2vqY*K&)oKbts{f$ zp_y&eAk3#`BW=r+E&aRHOA}3nHs-sV^xB7Xl`CPtld7~njy*DUwq)suR?e#Iq!Ti```M0UL>^YtRdBuu#~=4Zmi8dTq<~joAdQNvhg+^vAp3 zi;NZHLuE0#&h3Z=kU();%@y<}fXJY8n%yYycrYf&+6|WE6&3@IKrBQ*ZJ8UiQPVcB ztLFHZ&H7j`o)9$e0XskDHSYt@;?C+G5mb&Mb@YvFZ10Wg~8&#U8uWGwkn#F2be3m#6=eu(W8i6M>h0 zGh7ehH(ARk=2R@tNlZljN=RM*cap9iwkVH*$*^4Czip_nk>1^MTM1?-c;!&*$09_9 zrlS`8JKtI}hGR0q%S0rZ^Jw?vvxFHP*Om`k6wetcplm@c7n9q~{Kz?XS3G(bRf z0ABZgAdaLk@_-*mV4?xv3Bi%Y+JJ`uypqPo0K8_g#o9m|QfqW!Y+>ijZ(l{bl(z4W zCqgQc2o(eb#&ZCp1mCeMXdmx41-;*Tg8hQr4G=E@zjDAb(on1O~mNy-1cu}=rgj^&JIPns7{fuH?hcM?s3JXA2{Y&o;Xr+*(mA4^{nc;B6>h^_|tdGr@z5W1CSaa}pX=PIbZ32y4oRBt*n_CDwUq`SgL>ZvyStKw ztIoJh?Ct%aT8oP=VhVN)H==NUA?f{Lf;U&o=yI;d4~Qja2>7)TxB^?Z-cQ<39&8vq zr|$w+s@IY8Df(Uu<|Tv)_iRs&&M4_$@$~+~!y<@z-!XI?RA&u;iteDNnFt*YSI>_qN7^>O{N6ziTH~I(=OP@47f`HdG~O z=4`Awvkx1<>fL}CP1zbP>!Q*~#L})LCG;+>CHAx_#Hc;P+S3y?KNUw&uN9N$qE~I? zKqjfP<6o}x31>ctaE{qtms1P~G^wlz%TABsl!SgOYtK7qgiMVkuHIy|sc=!}h zmS=l+x+=BmHeS6|d9qLr*hg~VJl@<*uSJt%c(O3oO>huhr((&ZX0>6NmbZGwG#X;E zihZhFA-z%uyg-heR40U}u&kVSB0(69V(zmdnYQMXq~!$y>p441$Bfm&YFmoxplUZl zJO^Fk9r2iZ?wT(`C=(woUbTF<>A%3*;3F~({}A~K zIq-4aXp*g~Fyz^ca9gEqW69j=Jy605107fs<4pZ`iIL|~r}zEzj~YuW$H^UJ ze(A<8G15x+xCAs)LYmww#>3q1gWCxSifz zYU8#hapiDh2;#-o`D?h=lx1R{lfts{Qtcv5qJJ7AVpZ{(@H6d8tlFS^T%>58Qzaww z^uXbqRQnBLS;+@xZXg0#$zl$KG7@(U8Lm44&kc~G2)jXB-J^e6J7cqw!LHQGVd#lS z>V?D1QNO$`T5V}FA%3))Z=iZx>y0#@tIW*v3qP#zP0YEYOql#u(2toYH3TPcIQx%* zjucB-TKRT1%NZj7Y#w}QlrT&J-(iZX;yG4K6D+RB+7~dkC&v~X9;~w(D=L{VJVWBQ zxl#-2+_4S186elZIWmh`_aATRwWORFjY>Ug-}5N9(u$m{A0dE+vpE-VdAI0W!G zFjiNKuyHxo6=G%9r&!sRTAS^SWGWCIP<&658q|JyY)i{c0+~lrALpk!y+^^!o1H`d&T)VqmC3&c}HFyx0-oSUS zLI&L4aw%-N-hE7T>UGhUtmvB`?4-5?JX}1ufA`E8yiB36{TLtSd30#QKKVFVwpRJA zQKIccGHJ^l14cF6&FTG9J9&n+#CsQ1$&p0yvFv3&`|X>tj!856`|_cmJ7=_u{Oi2C zdPp#3@%p{j(dT0?z%sbp9^y#-Y*M&n(#fohhob~z6l;Yi#>cC6?+k`oymb96XvUK2 zG1Kd|$0F=(|LD)LoCT+9Gu-c2G1)`eKH4W~Gys&x`+^14y8ATt*ZpR7cgN|$#NJ@d ztq!DTBaRJl6QjN;oW_SCL~~Hrblme-_E)YR={8T-VM2{jd0?`>*(=KieC5pRd^@;By%jwM;f$*`DF! zvWx>Q=eX@#mZR``AtoSOqV{Oc*}_<2b29I^9*QRS>}#oNLR5SIMR-W_WBObB@h+_- zI$Zq(WZ~Jy`|b1GDWgWB-0v5*BIxJv$`3B&5QK(}^}aFt~p`jtgu znrnD-(uyC9=-F*ui167LP?oIvA=1-TG6f%7RvhWO=l>cDwoS{L$|WuPEP$tG+OjL{ zQ7vRkI`yME?F8YzJ!JJBg9a+~fFkrN6Ib5CuQI5X8gtt|5@m}EYsWvGB=5J9?5Smy z^3U=H1Mmun($rM77+DEf3CAI5@#p1tX`FoyVhYmS!b^p*E+BcUV~z!lDmUvCy$38%{%nLFW^M8QmASb8u9A)?)sTV$pN|(9r+(?KKEgT>H zAdQ!+dPr?`)hv$Gv_P%<$?5JvM#lOZMOzQ?%Q%8r%vhZfA`n*jF=qN4Fc6Q+D73G5 zl_bNHcIR(9h68?4YxBT9DP8+xgFA}<(0~;;@3iOG#5Mpcd*iWOL& zy9#dm;QuR9!OS=Ke~MHzd?HEPx*N1ZoXO0Jcc=WoYFaEW3Weg&KUGr@v}rN)OzEm4 za%WSn*GV1@QTB@DrfN}R)akc=h~bHL5CH(uCf3Z5K(GbRgu$Z&-y*TgArE~8c75<) zkO^};<~&>mu*u@%La{8ROcQ(+<{(FdEpn{HgrhtB_M@|V9;&(3AAgr{Tov|zjw`CM ze#(663{=qsMQB>w>xdBu2HqeBGhUKJp8`V{utFguS0ypO@=dCw%gN~G98frE0Ykrf zw^ZVzi3rSnyH_&ghti(Ut#RwJ< zqdY+XbSZiQAuqvrhAmONLuBOM$9C5Bmara#qo@-tagvOCw`c8{nXAgH+1NqFAOq27 z6#%j93+5IcrvBwjaHLBj@9m5N*1ppMa{zj>{Kb#M^4VVWBcvMC1UE!p{t!^dumJ{2 z`cje~iV&1zcp%PxFVk5ut{cXo^zYl9gTnb|vR{ zvXylJ`&CqrUQdIVoEU7xEf385dS3|sA=a)~2_I8gPV9$tywwfG?}8daNE8~1-QjRW z&6%O4KnF+*NNME#n|c|PZTU&JS)%q(I1ZgmF(h9FrQe3_Y}$8H!P3fqIyEFxonph& z@^8G|fznsMZ0X;dUurt01P~pO{m|enFl+mr=RwB(M7*sUCm` zk_C;|F0K?~tGBf~%;CaIHwq=3P>=kNDkZgK&GC(wB}0PY_}9ouuI#yZg;3YBKdyyPTD|`ts+2PeJV$UTZkN5v`OY@EyVE_G;eD_Oubj6tiy|$mIO+ud?5wz9vK9?o zd-E8?<*?(qZl|Q?KBbH!r}N)SlTm3=P_>nf3mCg_A#`Z=g@JQs{m6EBo`LB!+>y6G zDi+4o3ro#3^focfp5DQ3cJm zHUHoAC{Id0W4&sQa47?7#=28C@+D9nlmayapj-Le_KSlc;p_Ih^C#WU{f8g^ z5H7kC5jjlm+Niy7&2rj6NYF?Q>+ju9_k>`b=XKjo~zmZ%4CB z;`dC}>dttgeTI_%m4+;i+jM=LiG2>I=y;1f;$#|J{Jv8~ zvHLhzGaLBi1toSXi6(`?Z2<_YHnPx~UgFt53)K|&VyPO)`f(W}yu2;pR)Xv1Jog53 z5l8BCn^xFC;s|W9CH|bh;3BgP2DX-U7A>UuTPW;mOFV`(5I=vg(`8*5V=}jE-WKXxw%?SDVD-!ovX}2 zmh2^c?z8FQI6j#+irPCdRD)<0O?$4qcP^vQ0PHFcakX5!FBFr1sDNm#}luP5NrTS#mpvN zpVbcXMj`)QFrCUKQM!P<@})n|WS)q~SEy_SSu7n!Yk|Zpoe(8PoPU}MB*DHhP9BI@ z?_@S% zsHp)-M)?jtB%2tbD2j`3Rf4{cB&(Gy1w>8XVy)~TtemY#W5Hhg;m#lnJT)Kkpu|t@ znc7U9R~bd^Om{113qs-9al*gbW7x{wArVR7I>TV8RnLzga7LoW zO_S*epQ8ZZjW>*hj``!(3y09PI$Lz`2tc8+wMWsKdMm&Hwk+PkZ`v@T{6v$`b!dm2 zg9O*Ri%+VgtOQITQpJ~=df(2AF5#MpmA#JL5uZBCCzo6Z#T0bdb?`*rZER3EhPoyq z)Ff(Fd=8kK5Jp9=O%ygrE~!xA2OQELeM94Qz_LEM9EzAaVii7HU5*ec(Q5SKWiE}*SCz{!$=Ouy*LlFXk`+hcZW zz$$ti2C*&T>u5cp;p=E6y<_WcuD#$JrlNtcL8U`lIYgy{(BKmz0Z47P2GXSqpR5h8 zQ+os9o2N6OW1B*K*20Q6)He+o@}updS?q0jEZFSgc5$Hm;HDL0E^tfD1QOV1t2)C^ z@?P#KX0+iQL0yS>A39df^7m&dj|y7NRqv%VkI(Moi*9%*JW$nzT^^N->XzCzxf`Fj zmY_~UoOD0BxBTh$IL!iG$d>AW50#H02?ktW+NxpMTF3PvB~HP+U^-%YQM3G*PyrWV ztXN9_?8C~G!5d%A@*j4meL6$xq6$+*Qp0YP5A-x|C9W73^mX*UszK8!?!>8kkLiZb z>F7=cl6hoxZsFzNE&QV0DMb1X5SCqrM&>Z%f|HXc@rkm9o-e-gadku;+r=|&x;ci# z%NyvBuS1!KhFj_2d#?Yqe1CNh%JH2Q%vN{vL*r5-8t{xg&VpgM*`~tsS4C697!N-8 zXVb*!rb&^AcLwxwe`BP+SPNK-!ArzOwb0mYixSix>>@WF5FCi&}jmvQ3bzLF&@`EcB5r+znnpK?)1TXzzud*sz7(J_)7`~-E6MfE$9bk#GL@H5Q`ZO5!PD^ zsf6l|*8%Tv$dTWGs-}*<9fwKj){MAbWJU9qRkT_G9yK?kK*fueIQ5whtQjzZw4C;5 znc;)(Q^+0HV83f4))Cz2S={{!Gwg&>n3k$`vhL-!6H-cX?3|)MWl&N9`PEB1DHT%K z8K%uZH^ye3IUNaDC`Ya=xG4Myu)R4kVkc5rICr3^PgwFj6l90NY=&Pa;S*f3(q$LQ zN{kE0i3rtPR^r{QgQXab6Y!HGguF0G=~BMo`fTJlNXO=hec?d@rEu6&UZNWDS~$1$ z6pA-M>jn{NnkL>OD*X!W-_cw~NkU^QTq(R?_I9;Y~>20vv+vDw?TNbJ?`zwJt zgp|XPlT7sXwv_kc3d^_0@KAlFO9v$fKP2IMxDT&(gxmFZ+&6Wi4&C1}dZ1bW>rZer zy**hCD=kr`2!hbIx(j4U(iFFcd1m1adr(Q&#?=>I>va2}GLYs0-iH`YwveZ8m~B|Z zRHL`%t*!~r5EStJkfth}mF-@g5n}M$=I)O6FEtxxek<({r;+@&UrXs-{8rqEy#3xw zTfd>~e4T+W9-l8ncBd0UK)}>Y?Qpwqp*#>K&O!%fIb38o1o95Xfj!SVYtgc#0y{$TmB`;##IYcufQ#g!! znAKO&@_IFFkNkkEVe)bIuu8(sz9Vf3UZai^`fTz*hN#}nR39ULpla)I6 z-q(+>9O_yib?e${GG~$b!i@Wxx;7cB{bt@*dZOM2EFkrsIjlQc!V|s6P=DKfq@u*s;f>( z<3;}_c2(^Hy8qlLd!?R!zFYW5H}41BbcozH5Zu-p!5(IwkjW-Px(k%T<9h&eowG2O z&EtT!#GuIHmRx1I{w~6eAme0oU!`EN#iQ~W_%ve_wjGAI^#R#TOO^?m z!XmrNW4`~p9Bu+!2u$vT-*V^#eFIrNqRSmJO_nNEL#}VT5&ma&hhj#riZOJz>jK!` zm)@zj-gqmOQ-+io0uJF2gptgPO|D9EAb3inx}y7m5hee-D>mtC?UE9OMqtF&?9|H> zkv&lAulMLlVF_Pkvjp^Wg{2(WQb2fHDn`sxv~>S94+uRi%54urauy8RPg4}lAYi7S z0vHVJ0BflYblGkO`iHv`sZ17|5liGx)Gq&?}L@BXdR`rRY4%J|*yhLGBFKc*8?it_!v1mGC(&q-$cHA8Ca z?T4qZ^T9_)()n=!H#Z(4?Ecynr|rEaO7ka89Tub{{PWqTn*q1;qvg*)F5MrqB}${C zJ5rGHEMK2PTVE_Ao4Pu{N;+{NmQP#%V?+cIUqH`T;g1(BC`~SPH9-ud0+p@|OoL*M z@PUXLReveu7+dbf1j5LI)2Ye;V*5d}!soM58T!h^>Z36V9j&$(vZa&5`Q;A?f%L5w zf>Z9(Rla?-9?w3%Mkw1f3foSl`gMuCi{J`P-67Q6)XQFa;c{(t=^1IBMyPS&UeMvN`vXPj3bgtXtCHtYJ=7#Ba`Wfr)WMsN7_vUu2Qy5wP2J(TRy!t zNfEsNAf@)8rdJ^w2=UQ7#EQf=#IZc>17Vamon8+qp4kFZI^}4`HQ8E7?q-(tJ4>u` zi5p+VH;S9iP3Z*P#)-s9gu4?2#|TVa25Cu$J72_d`5vND+9t`yE4W+k#rwYP6uvrf`Hz2v2Z{3W&PPok_Y)HuT4@v(i(yGWhj};*)c1YWkCvl4tRsPJK}A{cv$LH9EC82Z+Pn(!AA?{~Jh~Rje|MBanDrlzd#0yj_-j zT9JHOmHbPe-iWvYo*yl?8GLkM>Xm2-zH{uDCaWU+4_PXMP^+$y`@}h3-tRsPJF)62_y`A-i zr$1Iz?z0;z_wC#_&8ex>9>UrL%v6q@Wep=}grG@AcbA0NhpF$>l(CPq7WLRcY3^EF z=}Z#YHabRjPK5APXzW=%;`%ouDwsqgi?GzaB`+y3FVmKZk{=Oj|ExJJ4KnO0A zWw(~%*fuL~gAI_P$uJbK{r`=gN|hgWeav&CGx{$+)8IB7)ob1jAaY6EM*IPN$mPHilzGk zBZ@Lf>{IAUXTSc8{P99Zkvmb+8kQ}{C8}2r9z7zDZ9e1p_v)ffYsCIm(e*BSB_7ws zZ9~~^kncKo$Z$2|>g%!%;nj@qr-(_VxjcrIqA+4jad0FAdCMzXI}l*)8uesp0ZOXz zB-)*90LM^159Y+-IiG~l&6M2=4C}px!tHLtiau=;M>caOWnc5C6&%ZsO(IxpNAfv< z{=|3l9y*}1v6j$zqpG9GV)=9KC1};!7^*xl)=@k~U4$E|5Vr5lKjED%8me$w7^*=2 z@yBc3&Wu#G^u&%ZiN;_;s04WIasC07vga&p1W&dA0*N7k7i{P6#04ls0w*j|en?d#y$d~B zeR~>6{)R+`q>QSf&b83iNLiJ+=g0$LkCmzK$Bg<|+N>tX&db+`47pD=Bny{iurXp= z2l7=6?J&+Hsw%s<|D+2Aqhu@;yC}^lS@P!%^uZlu{nyg~RW3Frjccgc#~C1#EO%a2Wu;En;) z6b+tPO9G}Bd?(XhPTKawS&z#KBob0voz6Z(5+R1*h_j6ydqJ|ph)aazfY|uz|+F)wd zh}X!wcIG1DU>EcT^8Ah>T+-t1VlTSJvH{A^_-KwEuVH@Js!g+?rU21v(ms+pC`^54 z!LDLCng5+=+a&<+?0{R3_tnmiJ$NyHwy8?pW`lSI;>+-QJztd*2Xajoa$6Ee^m~?QXRBkMf&f$1n-obHu7qrg<=C-mUvSQ$l*VS33vn1iR^rC z^p)>OXKfrm6BvG*>w*hrN=Ej3#&XdY`7v}Z644Z@ug#tgC+bmRKRJM9tr=W8;Kl_h zj+GWZWYOkYeu;^(TMQD`;3J@yFnywQk0MZ#!yzjZy%eX-*J7v9B5<3^PRHHoLLUd zw7TsSSlKzPTE>d@1b~UBOi^%uUO3;me-JFLRUwg#OH6AJx)1cvl+l|-P`Xk6arHD! z=Cm&JvF~}@kMQykG^8wz^LQcR{^r<)UkPGDd3qU=p-@vXZ@drTuVgw zsce^KZM{t}b8u;%0=P1SP2k2(DyCl_YEn{0%ORPAQ*EfYjEQ|bzgnfdcjS}58>a0` zVgqiLqsV1)_)jFbZ@Hxg34RIGU`^?M(t60`Ly*d?;0tZY^6Lc@km0EsB#z1SL;s zIN6qyW)A;pg@F`gyI_y|ZO_ixaRbUS{hFK?!@dN0_%p@F8MysdQJaXQi7_TotPrv^ zHtoVdc%GZeLadJi+%>53vEWp2E8VYA5$4{MwwyS@w#{<$OZ2-Os`-lv`LDKUp9yIm+Stidud zUI&%ki~{a_f+WK@@*w?_%BF^;DR+NBhuei@N?NbKK{!!@er_B=1tnZ@ z;q=-CYogRHThmE;665$ z4yZr3+3w`&aUBQ&?}1n|DmeRhdMZ<=9HOwRiy#QvI%i@-uvjs|g|YqDtZ0aQ7nF1f z4}=B^7#?KWc{bC1$d&9N|L2Tf21(Dy4x@@=>LI<9a6xTrtev{e*QA0~`sn>1tOA{< zTV)xN7^np))_|YpGiM{;vHTP*k=2B5_NG4AofbnKf=w$C#3@Z}HpX|MbOsMA>HdQ= z_(~|p7wahY*FwA837eA>67O}l+yXJ_2dfT$KvX0<7p@YUFSa_O6IayJ=n18>^{!LY z_3#cHdcsNH`g!)WE6*W&H*xX$3lD(T0S$cFAc}+C3W+f7{^G zn2<5*u2!;1^=i?D~R*7?ZN3Gv5$3l7H&sCd4$_Da*{ukmRL<4i zygf+koUO8(fV;X{S2GBO6Pl&R7uDg-z^P*bvPttU*1@rE$*Ae|a38ci#4m)9DCk8= z?JtD_wN2HPcb9}Z|S9NMjkW&|D<=QMZL z^F60AS57WhkT-bjLdUjV{d?ALuFfpQ7bX1vi%>Xch-^i7e||Usb=S(-YS{JD>U0e& z8p^_~$i*3uv2%X)d`V_5)Mg2YiIU0=tI>q2n4a1C`pV|kfQm<|X#VA8p z+Y`mFF#|Eef;!9jKluq2`r0=7U3n|v)lP>R@-5xq!v!P}+`|2&y~hyZZ_w&6dqt?` z441Cpmg%pO4IqY`Sj$GWwNcVplY?)lG>ePu#%Kry@5q|A-RaFz+4zNE+u?|T=<)s0 zoS<3l|6h87U!R&mXF1Y7DaipS&>)WJ;Q}BmSh4W#E990{BTpB5o|0eUIJHimE;UtQ zV>4i7?W&oQwe%Ch@6qdvpAess~&S!*v^I;C^&g0y)=Goz4>cWb?8 z9;C!gWVALS^~7u-h|!B$EW>^+rz%JB+_p~LbqFOzj_r9=lQITzKJ@^ zTKdwIW6G^Ym z?Kbj7`LhEB>bNV5dRT%+cRGB5@x?$m5Fuh#Q4?hq41+ZrzJItO!RmGZx6$K9WC;p;^G{(fGbv_zdDgHT=euXZs2DcSmFn z&l7bCr*^`+BCb;T?}o^q&-?P8Y?HP-o=ik3+I;COr{G2Pz)AaMNt}=I+?c7ZIq|$}-lnXw}Xg2V=aYg{#oO zFhu|6s)o!3i%u)i@wgX`kg53^*x|` znmSg4fnyiKp%i7|j)Zp&&(N#z_R&qn$#0J;Z%Cb?Q$BBhXS|o(@P44|KM{|*3Vtx+ z(Yi`uv9{(>Ecu`>!{3(b>z)C`QfmA4c2%Aoa!54<{o{rrKHOONFH*@zTt9T?uii!P zX!21b5-YlYVU!#m<2_7ihMJ;%BH@|pr62`4i)MmIiKi=Zhrt2GsubOW>iYnRM}LtA ze>)68Zmgk(2o-L*9`|hC?DkZlx|c*)=>7U^kRt56G0IcXKXgWnQyu|Vj;{uB7c*2C ze0(C=*ou&puZZ~hYXxz+%v3AXptbof9;h&*gd6fdx5k7rtA!-{^Sn*!5-JD1HY67y zO~c+}aWE5W>SPJ{W?-WLh!`r8Z0C96L*1Ib5gTwa6Wi(3{Jm2-{3S}3e=tD_EQZu$ z{CW{X?u0Y*Z}H)Z>JqHc7KvitUA7c`%3q<4mE?SqH?4@b^eGfKsL%H{X->Iq7%knG z04>2i88;h8l_BjOlwS8To~W9$q0l)lE!QqsH1nurvD%1BJ3!cAm$ws zc8d{R3kJCR#%Q<#2|`A6ebgyLSCH09XN-Tr(mtR$QF@}=vg^HcdbZ}!R6XDqBL2XVw&laRA zgvc*Ktloc<7-or%H8FEL3NxUfmLQ=QcOhX@W*GL(n%|=qz)Q&|h(fr4Z+3UDV)c>? zM3toR7wyQGNPclVz?TXJ zZb&Es^RL|;qSY%ZR^)XDDp1G`pq*zUtFfA^| zdbq1;i0NGl74R>BZl<7JNO?L(r?%rFsX~sD zQ8XKA6lF3cbyeZx)ZYnX-9<8JUkE{N*nv%%)YkZt?=5iw-2QneEu>06f(*2$1$kXc zrOX!qAta+rPTn2LD1K9V_LP)xT|7gS9DoBvdIjtB3UmG~KhU`{Er>DFXku8W;hoZ*AR zd>UQZFKI4AEt!&4P`=UHHv!$Qg1^Ma`ZtyOaGBc@Lv2+B)3mZ#EGHPUM^R5F^#_PS z-bLXf#wI$gA=TZPehD*&$#ldi4ABCVb=i{(1n<4$Tff0RZMbXFiw*3$_sAqA^^xLK zQ`N%=Kz8a+^UHa$^b#THO8wycVajpvXA!H{ zzDhEdGgJg}zS=17JiTX{nOfRC^fqs^H%)Qn;D+ShJn5HC6SXNoA!SK3`6wH$vi6e7 z7N_YK&QZqmlK45(=SXagjichS-Y=n=Flh=-j*)HgrQ+yc!oAE}FGL!X+-2*I7KwleIBD&($#1KNd`& zQolS#VgaWu=ylSvY(kH>F6UXBe=-%@^&cURNGrZZThxu3)T{}yyH4NjTH`fLf*3{R z-hXV4^J}W&3e&@l4txO&zV~;+(Z<=c5-z1{r_Jl;rjV{HpAge+VT~LwTh>+5!%r!X zPrTB}#8mEOS`)q$+$fY}se=J6Q-;2AGGhGl)s$&tWGb#6aswv^!K?{7B7{{VQzM{4)*YjuIi}jr2cwxUO?f3;)A% z2oH&*F#qFq3{Q+ap~WseQ>rQy$La%Wi*x|x0zKSN3v3;)_N~A+CzK;g%LlXi!ZY#; z7>fn4>M7o%bJOze1TSn14sjukwQ;qff4IQ{yuG9rG9TL5(^-5gHfPqogdHZoa`z+s z!rP7_NRFq4Hx%0`iumhOtt(0h0TuJ^w+iVRKwXKjGp#GGsPU!r{uHe2Mo%w8s9>2d zy9*LBQI)Di8=kJOj}Z+{&wQf5R)$!g{>q(QI!FqCD{_E_<_B(Sk5B!j-yQ-SF!1#n zAxXJT@8H@Es-0h#BeTJP*7D)FK_M>lKL+#@-Sv4`Q8R z)0zBto98srUQNEZ4ZFKUsDRR+hv?K~4vwEh<1rUKj1c%IB(mr|V`hjjwMtrdM8h1z zBM4x77z|t8{?;BQ8>!e&MBklYRE|AAKaI(2ScPS`Z%s|~TayZ0sR`>SEk}^MH zt#U0wTAXNXlvMZbN^QV=-enSp;gH97-L4b{cEH;>w1S>~M4XH|*<6yf^=YwpgHr4WW*s~es8Mc(!&3nAR+H8lbIuKJg+!;z7C;W;p@VA=KaFRXAz zo#i4Wa1v12#R6g=5N_)8g#Jhs^=sx+c|z!rZ;0P5#I22*e*EC-h}g!sHk~g_mD# zW^c(LNRWN^0~X6@mWNwjs4te+gd&OY<@I4R>3e+|>Xa^^A@`Qa&SA!r zmg*4Neog3BxbI7X2Vf>|JqrSN$-H%R+j~^z&Este)RILX(eisw;81wMkiFj_Ma$Gg zWBBoS_!qu`9oxXhbqOe6m(iUeqNLVaA9MMDi8G-A;}d)F&t*bRCEAfEF500l#Tul3nPIX(3PSWkE6o!3M+H5(W!aqsJgK6HDtv3-}UoqW}mI4B6(yl45v{>P?G? z#s76Vz&M9-On#$B!+yc<0W5B1SWaIiToOLKXZ=w$#vWC~57Ei54Qnwg;@xSN!m6G( zCO>CA4_VG-{i~^{D|4wiII^b%;`4OHy9EU}Ss2&M#*ywj(~OI-Ogw2O3{pJzjBf-P zBYk}H87j@N)+=y%W%;clE3gb?e15c`lDOOTW8I3+{`GJ~q*8Cr6#mwTc+{e|T*G+i zyD}tzgiv`jl(ZUDuQ3^7RN`7tOOQS{c-as-^wm}Vs42lp%&epEl6e$NnoNWsNo^&` z6yMTcI=MGEE+;OFJfAteJfarQz0~h!0Hp*X01?9OGmX;q)8u{J#gL%b(Ne z29acb3XhNH8%1!OKYlOHN?o|n{$p0_0uEZYgx$M<+!3fFu~`NB&=0JTo^KB!a*6l| zp>HoDrADmhy>y%BYFdM1IoRv2`A?AF!M05SrgK;?pI}MAS)Rl98=c##{gR2hNYaMn zh#Ye|%5D~f30%&cZ`z4;B;r-7s-p578h*oQ_6%Z&9zmfAjmS@C^>O0MKH5{T(J=S% z1MvaVB>^_S;woYU-aR-?4Ky2)TF(Rn8ht;PyqEwCuU)%x08vX{l;9u?wm0Jm#&f=t zS~mp)CPeW^UW^0kUQQbrx>_~qkflOEEMQ^a&t(@@i_KfsuHvBKAjQA<*g)}C0?T*J zIv0gjVA~a2uc^6Gv4iMx;S5cc<@>COkS+`3VzkDzm%MS%BJ8*u>hPSQC((mUStR#? zA0*WQr=eFyl-B6j!dwlkK{d3490GY@m_q65Bh2;6X2S6(>~)#$R&=o2aT`EPW~*`h zV!vIY1=}1|O9-`mbSe0~|GD;2;O_IO6MP{CWb04y6OQHeY^a%b-)+wEN^$DA@XeRP zzPmazTu}L>h`uZ5cVYkc^$+Gy+q%HnU9(IEbp(mMRQuTLvQ$R{H2biKQIi)1Z7#l@?XqASbwr-=A}ycy2)sUj(*!6iOQiL2{de;9dcIi}FwWaBd@qh?>y z7HPgE+58su!gBofIWky{U%ZZV=9|I{?qrc4bvklm;~)373xASvzG_oQF7a0@gw%Bs93IC+1I9FZda;-8%G84GhIlmBHqzzEmo zO@Uta5@2{LNT^Rc!)V9n^?g?=R~Y>F#F&@)$-b2f?uJ%@GJ8oECT&n9Ucn%bG%+@4 z=ls$&aQ|TFlzG2RnK2%bZ6{U|B#kv-VXrkbKN5%Mi3mwTsFlVIUp^&%PL707P z{`}rLacuthP%^p%NwPmf!*Q)#gG%P>_{wJ1~FFum220o zU`ctVJVyMhzRO3d7qeB{f}pvGrKxRy z*jwTX&z=;mdJh6%AAXCIMp3ko4iGI(9oxO8ff69c9(Ia5Wt0X>vM$GJ>6acpQmxaQ zS^;9M(o@!xhlV+vRjID3lhXxZ?Ds-K_FqHT$8#bDI-TT)#s$||rbx~t+sc>>_l;mq z&|1G;Dx8M(3OY5*F;V~-?w&qS6{bFNTu;SXkp4&bXe;DtxbChUr)e;ega*Kobq40B*o;hzZ^R;H}og7_t$P z;k@^O*0R5pc->d_T74g|6u-zAa@qOZyEJ*gY5}F4@rc=Rbx^9txg==ueeqRuHHFPi z9tC`I>WmMi%zH{G=X;;ngPXuyssTQb))t1q*`V}U5TVC|fq+R+B{}~c;8Thm1Mef~ zK;p1Egd9b0QBG|}3AIW3FdqWN1T|#G2g*C7aGHaXjf@AIXEdym^eybAN=k>bu| zI8K(CUlsZQfC4Y;zymu>nw4)BUY{iPkdwfJpM zo&2cOU2TD*0O})fs@}hk{tqr9l1n5&yab4Z`ZV& zJErhXDaXr*Agd^_Lkmt?wHCcbRTv1JgSdqgCjxbRvDnGe=0!#)8V`MiMlu;dn;jh| z#vbgWA`P3TPFefp5@D#MdaEKrqRdy{-u84GTE!`$=qR1NeFS(m$wa4l( za@KBJMq1HaVkyFG2H=cayT7Kz!YJwuH;#{OG~xlpDjs}D4Uxv_DD-H@;kagbm-=ag z3<$qa^!nBPg46UvJMWEZV32hM{YK0pz-Y6&x0f9XsG6;jofQ^B zQU}4K0G2^!M5o#x_{=p*^u+!wc6Uq1MS5W&)VBO%kpLI_L&No=EMTcgb>-}vcrrK` zbPfS$s6R94V=P;TQlmjJ%z+cCDZhj*7Hrl^Me*k2q#{mBCotM{byg7Bj0VthKN`Q* z-swoxfOgk>vf%%nKQKOH)}sZMf7>!}p~BFdA|n-unmz~RS4rQ%JX{?1T1sVzd5{x1r*9W;jz12aKb%>9dDdr1qC3A`Th)Hj2PSTuZ|c-1 z>fNS22<43h6p4J9ncnPvl-ej5d;SPMH>jDYMj7%SO`7Gqdb|xBeuu)P h+NzO!6B **Tip**: You can use the default [values.yaml](values.yaml) + +## Installing Fluentd and Fluent-bit via logging + +The previous chart does **not** install `logging` resource to deploy Fluentd and Fluent-bit on cluster. To install them please use the [Logging Operator Logging](https://github.com/banzaicloud/logging-operator/tree/master/charts/logging-operator-logging) chart. + +## tl;dr: + +```bash +$ helm repo add banzaicloud-stable https://kubernetes-charts.banzaicloud.com +$ helm repo update +$ helm install banzaicloud-stable/logging-operator-logging +``` + +## Configuration + +The following tables lists the configurable parameters of the logging-operator-logging chart and their default values. +## tl;dr: + +```bash +$ helm repo add banzaicloud-stable https://kubernetes-charts.banzaicloud.com +$ helm repo update +$ helm install banzaicloud-stable/logging-operator-logging +``` + +## Configuration + +The following tables lists the configurable parameters of the logging-operator-logging chart and their default values. + +| Parameter | Description | Default | +| --------------------------------------------------- | ------------------------------------------------------ | ------------------------------ | +| `tls.enabled` | Enabled TLS communication between components | true | +| `tls.fluentdSecretName` | Specified secret name, which contain tls certs | This will overwrite automatic Helm certificate generation. | +| `tls.fluentbitSecretName` | Specified secret name, which contain tls certs | This will overwrite automatic Helm certificate generation. | +| `tls.sharedKey` | Shared key between nodes (fluentd-fluentbit) | [autogenerated] | +| `fluentbit.enabled` | Install fluent-bit | true | +| `fluentbit.namespace` | Specified fluentbit installation namespace | same as operator namespace | +| `fluentbit.image.tag` | Fluentbit container image tag | `1.6.10` | +| `fluentbit.image.repository` | Fluentbit container image repository | `fluent/fluent-bit` | +| `fluentbit.image.pullPolicy` | Fluentbit container pull policy | `IfNotPresent` | +| `fluentd.enabled` | Install fluentd | true | +| `fluentd.image.tag` | Fluentd container image tag | `v1.11.5-alpine-9` | +| `fluentd.image.repository` | Fluentd container image repository | `ghcr.io/banzaicloud/fluentd` | +| `fluentd.image.pullPolicy` | Fluentd container pull policy | `IfNotPresent` | +| `fluentd.volumeModImage.tag` | Fluentd volumeModImage container image tag | `latest` | +| `fluentd.volumeModImage.repository` | Fluentd volumeModImage container image repository | `busybox` | +| `fluentd.volumeModImage.pullPolicy` | Fluentd volumeModImage container pull policy | `IfNotPresent` | +| `fluentd.configReloaderImage.tag` | Fluentd configReloaderImage container image tag | `v0.2.2` | +| `fluentd.configReloaderImage.repository` | Fluentd configReloaderImage container image repository | `jimmidyson/configmap-reload` | +| `fluentd.configReloaderImage.pullPolicy` | Fluentd configReloaderImage container pull policy | `IfNotPresent` | +| `fluentd.fluentdPvcSpec.accessModes` | Fluentd persistence volume access modes | `[ReadWriteOnce]` | +| `fluentd.fluentdPvcSpec.resources.requests.storage` | Fluentd persistence volume size | `21Gi` | +| `fluentd.fluentdPvcSpec.storageClassName` | Fluentd persistence volume storageclass | `"""` | diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/app-readme.md b/charts/rancher-logging/rancher-logging/3.9.000-rc06/app-readme.md new file mode 100755 index 000000000..2de4ab4c5 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/app-readme.md @@ -0,0 +1,22 @@ +# Rancher Logging + +This chart is based off of the upstream [Banzai Logging Operator](https://banzaicloud.com/docs/one-eye/logging-operator/) chart. The chart deploys a logging operator and CRDs, which allows users to configure complex logging pipelines with a few simple custom resources. There are two levels of logging, which allow you to collect all logs in a cluster or from a single namespace. + +For more information on how to use the feature, refer to our [docs](https://rancher.com/docs/rancher/v2.x/en/logging/v2.5/). + +## Namespace-level logging + +To collect logs from a single namespace, users create flows and these flows are connected to outputs or cluster outputs. + +## Cluster-level logging + +To collect logs from an entire cluster, users create cluster flows and cluster outputs. + +## CRDs + +- [Cluster Flow](https://banzaicloud.com/docs/one-eye/logging-operator/crds/v1beta1/clusterflow_types/) - A cluster flow is a CRD (`ClusterFlow`) that defines what logs to collect from the entire cluster. The cluster flow must be deployed in the same namespace as the logging operator. +- [Cluster Output](https://banzaicloud.com/docs/one-eye/logging-operator/crds/v1beta1/clusteroutput_types/) - A cluster output is a CRD (`ClusterOutput`) that defines how to connect to logging providers so they can start collecting logs. The cluster output must be deployed in the same namespace as the logging operator. The convenience of using a cluster output is that either a cluster flow or flow can send logs to those providers without needing to define specific outputs in each namespace for each flow. +- [Flow](https://banzaicloud.com/docs/one-eye/logging-operator/crds/v1beta1/flow_types/) - A flow is a CRD (`Flow`) that defines what logs to collect from the namespace that it is deployed in. +- [Output](https://banzaicloud.com/docs/one-eye/logging-operator/crds/v1beta1/output_types/) - An output is a CRD (`Output`) that defines how to connect to logging providers so logs can be sent to the provider. + +For more information on how to configure the Helm chart, refer to the Helm README. diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/NOTES.txt b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/NOTES.txt new file mode 100755 index 000000000..e69de29bb diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/_helpers.tpl b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/_helpers.tpl new file mode 100755 index 000000000..b2b289443 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/_helpers.tpl @@ -0,0 +1,66 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "logging-operator.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "logging-operator.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +Provides the namespace the chart will be installed in using the builtin .Release.Namespace, +or, if provided, a manually overwritten namespace value. +*/}} +{{- define "logging-operator.namespace" -}} +{{- if .Values.namespaceOverride -}} +{{ .Values.namespaceOverride -}} +{{- else -}} +{{ .Release.Namespace }} +{{- end -}} +{{- end -}} + + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "logging-operator.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Common labels +*/}} +{{- define "logging-operator.labels" -}} +app.kubernetes.io/name: {{ include "logging-operator.name" . }} +helm.sh/chart: {{ include "logging-operator.chart" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end -}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrole.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrole.yaml new file mode 100755 index 000000000..709eedb91 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrole.yaml @@ -0,0 +1,167 @@ +{{- if .Values.rbac.enabled }} + +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + creationTimestamp: null + name: {{ template "logging-operator.fullname" . }} +rules: +- apiGroups: + - "" + resources: + - configmaps + - secrets + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - "" + resources: + - endpoints + - namespaces + - nodes + verbs: + - get + - list + - watch +- apiGroups: + - "" + resources: + - persistentvolumeclaims + - pods + - serviceaccounts + - services + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - "" + - events.k8s.io + resources: + - events + verbs: + - create + - get + - list + - watch +- apiGroups: + - apps + resources: + - daemonsets + - replicasets + - statefulsets + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - apps + - extensions + resources: + - deployments + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - extensions + - networking.k8s.io + resources: + - ingresses + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - extensions + - policy + resources: + - podsecuritypolicies + verbs: + - create + - delete + - get + - list + - patch + - update + - use + - watch +- apiGroups: + - logging.banzaicloud.io + resources: + - clusterflows + - clusteroutputs + - flows + - loggings + - outputs + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - logging.banzaicloud.io + resources: + - clusterflows/status + - clusteroutputs/status + - flows/status + - loggings/status + - outputs/status + verbs: + - get + - patch + - update +- apiGroups: + - monitoring.coreos.com + resources: + - servicemonitors + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +- apiGroups: + - rbac.authorization.k8s.io + resources: + - clusterrolebindings + - clusterroles + - rolebindings + - roles + verbs: + - create + - delete + - get + - list + - patch + - update + - watch +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrolebinding.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrolebinding.yaml new file mode 100755 index 000000000..89d17d094 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/clusterrolebinding.yaml @@ -0,0 +1,18 @@ +{{- if .Values.rbac.enabled }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: {{ template "logging-operator.fullname" . }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +subjects: + - kind: ServiceAccount + name: {{ template "logging-operator.fullname" . }} + namespace: {{ include "logging-operator.namespace" . }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: {{ template "logging-operator.fullname" . }} + + {{- end }} \ No newline at end of file diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/crds.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/crds.yaml new file mode 100755 index 000000000..f573652d0 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/crds.yaml @@ -0,0 +1,6 @@ +{{- if .Values.createCustomResource -}} +{{- range $path, $bytes := .Files.Glob "crds/*.yaml" }} +{{ $.Files.Get $path }} +--- +{{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/deployment.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/deployment.yaml new file mode 100755 index 000000000..da93d4c29 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/deployment.yaml @@ -0,0 +1,62 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "logging-operator.fullname" . }} + namespace: {{ include "logging-operator.namespace" . }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + replicas: {{ .Values.replicaCount }} + selector: + matchLabels: + app.kubernetes.io/name: {{ include "logging-operator.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + template: + metadata: + labels: + app.kubernetes.io/name: {{ include "logging-operator.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} + {{- with .Values.annotations }} + annotations: + {{- toYaml . | nindent 8 }} + {{- end }} + spec: + {{- if .Values.priorityClassName }} + priorityClassName: {{ .Values.priorityClassName }} + {{- end }} + {{- with .Values.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + containers: + - name: {{ .Chart.Name }} + image: "{{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + resources: + {{- toYaml .Values.resources | nindent 12 }} + ports: + - name: http + containerPort: {{ .Values.http.port }} + + {{- if .Values.securityContext }} + securityContext: {{ toYaml .Values.securityContext | nindent 12 }} + {{- end }} + {{- if .Values.podSecurityContext }} + securityContext: {{ toYaml .Values.podSecurityContext | nindent 8 }} + {{- end }} + + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- if .Values.rbac.enabled }} + serviceAccountName: {{ include "logging-operator.fullname" . }} + {{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/aks/logging.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/aks/logging.yaml new file mode 100755 index 000000000..c7f6ce7e5 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/aks/logging.yaml @@ -0,0 +1,55 @@ +{{- if .Values.additionalLoggingSources.aks.enabled }} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-aks + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "aks" + Path: "/var/log/azure/kubelet-status.log" + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/eks/logging.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/eks/logging.yaml new file mode 100755 index 000000000..30c22d82e --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/eks/logging.yaml @@ -0,0 +1,56 @@ +{{- if .Values.additionalLoggingSources.eks.enabled }} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-eks + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "eks" + Path: "/var/log/messages" + Parser: "syslog" + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/gke/logging.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/gke/logging.yaml new file mode 100755 index 000000000..a1f36c670 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/gke/logging.yaml @@ -0,0 +1,55 @@ +{{- if .Values.additionalLoggingSources.gke.enabled }} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-gke + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "gke" + Path: "/var/log/kube-proxy.log" + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-openrc.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-openrc.yaml new file mode 100755 index 000000000..0143b6a89 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-openrc.yaml @@ -0,0 +1,65 @@ +{{- if and .Values.additionalLoggingSources.k3s.enabled (eq .Values.additionalLoggingSources.k3s.container_engine "openrc")}} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-k3s + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "k3s" + Path: "/var/log/k3s.log" + extraVolumeMounts: + - source: "/var/log/" + destination: "/var/log" + readOnly: true + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-systemd.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-systemd.yaml new file mode 100755 index 000000000..56aedb2d6 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/k3s/logging-k3s-systemd.yaml @@ -0,0 +1,65 @@ +{{- if and .Values.additionalLoggingSources.k3s.enabled (eq .Values.additionalLoggingSources.k3s.container_engine "systemd")}} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-k3s + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "k3s" + Path: "/var/log/syslog" + extraVolumeMounts: + - source: "/var/log/" + destination: "/var/log" + readOnly: true + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/configmap.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/configmap.yaml new file mode 100755 index 000000000..2af01ac0c --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/configmap.yaml @@ -0,0 +1,26 @@ +{{- if .Values.additionalLoggingSources.rke.enabled }} +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ .Release.Name }}-rke + labels: +{{ include "logging-operator.labels" . | indent 4 }} +data: + fluent-bit.conf: | + [SERVICE] + Log_Level {{ .Values.additionalLoggingSources.rke.fluentbit.log_level }} + Parsers_File parsers.conf + + [INPUT] + Tag rke + Name tail + Path_Key filename + Parser json + DB /tail-db/tail-containers-state.db + Mem_Buf_Limit {{ .Values.additionalLoggingSources.rke.fluentbit.mem_buffer_limit }} + Path /var/lib/rancher/rke/log/*.log + + [OUTPUT] + Name file + Path /var/lib/rancher/logging/ +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/daemonset.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/daemonset.yaml new file mode 100755 index 000000000..19ba65681 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/daemonset.yaml @@ -0,0 +1,126 @@ +{{- if .Values.additionalLoggingSources.rke.enabled }} +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: "{{ .Release.Name }}-rke-aggregator" + namespace: "{{ .Release.Namespace }}" +spec: + selector: + matchLabels: + name: {{ .Release.Name }}-rke-aggregator + template: + metadata: + name: "{{ .Release.Name }}-rke-aggregator" + namespace: "{{ .Release.Namespace }}" + labels: + name: {{ .Release.Name }}-rke-aggregator + spec: + containers: + - name: fluentbit + image: "{{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }}:{{ .Values.images.fluentbit.tag }}" + volumeMounts: + - mountPath: /var/lib/rancher/rke/log/ + name: indir + - mountPath: /var/lib/rancher/logging/ + name: outdir + - mountPath: {{ .Values.global.dockerRootDirectory | default "/var/lib/docker/containers/" | quote }} + name: containers + - mountPath: /tail-db + name: tail-db + - mountPath: /fluent-bit/etc/fluent-bit.conf + name: config + subPath: fluent-bit.conf + volumes: + - name: indir + hostPath: + path: /var/lib/rancher/rke/log/ + type: DirectoryOrCreate + - name: outdir + hostPath: + path: /var/lib/rancher/logging/ + type: DirectoryOrCreate + - name: containers + hostPath: + path: {{ .Values.global.dockerRootDirectory | default "/var/lib/docker/containers/" | quote }} + type: DirectoryOrCreate + - name: tail-db + hostPath: + path: /var/lib/rancher/logging/tail-db/ + type: DirectoryOrCreate + - name: config + configMap: + name: "{{ .Release.Name }}-rke" + serviceAccountName: "{{ .Release.Name }}-rke-aggregator" + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: "{{ .Release.Name }}-rke-aggregator" + namespace: "{{ .Release.Namespace }}" +{{- if .Values.global.psp.enabled }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: "{{ .Release.Name }}-rke-aggregator" +rules: + - apiGroups: + - policy + resourceNames: + - "{{ .Release.Name }}-rke-aggregator" + resources: + - podsecuritypolicies + verbs: + - use +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: "{{ .Release.Name }}-rke-aggregator" +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: "{{ .Release.Name }}-rke-aggregator" +subjects: + - kind: ServiceAccount + name: "{{ .Release.Name }}-rke-aggregator" +--- +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: "{{ .Release.Name }}-rke-aggregator" + namespace: "{{ .Release.Namespace }}" +spec: + allowPrivilegeEscalation: false + allowedHostPaths: + - pathPrefix: {{ .Values.global.dockerRootDirectory | default "/var/lib/docker/containers/" | quote }} + readOnly: false + - pathPrefix: /var/lib/rancher/rke/log/ + readOnly: false + - pathPrefix: /var/lib/rancher/logging/ + readOnly: false + fsGroup: + rule: RunAsAny + readOnlyRootFilesystem: true + runAsUser: + rule: RunAsAny + seLinux: + rule: RunAsAny + supplementalGroups: + rule: RunAsAny + volumes: + - configMap + - emptyDir + - secret + - hostPath +{{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/logging-rke.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/logging-rke.yaml new file mode 100755 index 000000000..07738cf60 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke/logging-rke.yaml @@ -0,0 +1,69 @@ +{{- if .Values.additionalLoggingSources.rke.enabled }} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-rke + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "rke" + Path: "/var/lib/rancher/logging/rke" + Parser: json + extraVolumeMounts: + - source: "/var/lib/rancher/logging/" + destination: "/var/lib/rancher/logging/" + readOnly: true + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- if .Values.global.dockerRootDirectory }} + mountPath: {{ .Values.global.dockerRootDirectory }} + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/configmap.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/configmap.yaml new file mode 100755 index 000000000..d8910122a --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/configmap.yaml @@ -0,0 +1,18 @@ +{{- if .Values.additionalLoggingSources.rke2.enabled }} +apiVersion: v1 +kind: ConfigMap +metadata: + name: {{ .Release.Name }}-rke2 + labels: +{{ include "logging-operator.labels" . | indent 4 }} +data: + fluent-bit.conf: | + [INPUT] + Name systemd + Tag rke2 + Systemd_Filter _SYSTEMD_UNIT=rke2.service + + [OUTPUT] + Name file + Path /etc/rancher/logging/rke2.log +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/daemonset.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/daemonset.yaml new file mode 100755 index 000000000..2b4672811 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/daemonset.yaml @@ -0,0 +1,101 @@ +{{- if .Values.additionalLoggingSources.rke2.enabled }} +apiVersion: apps/v1 +kind: DaemonSet +metadata: + name: "{{ .Release.Name }}-rke2-journald-aggregator" + namespace: "{{ .Release.Namespace }}" +spec: + selector: + matchLabels: + name: {{ .Release.Name }}-rke2-journald-aggregator + template: + metadata: + name: "{{ .Release.Name }}-rke2-journald-aggregator" + namespace: "{{ .Release.Namespace }}" + labels: + name: {{ .Release.Name }}-rke2-journald-aggregator + spec: + containers: + - name: fluentd + image: "{{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }}:{{ .Values.images.fluentbit.tag }}" + volumeMounts: + - mountPath: /etc/rancher/logging/logs/ + name: logdir + - mountPath: /fluent-bit/etc/ + name: config + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: "{{ .Release.Name }}-rke2-journald-aggregator" + volumes: + - name: logdir + hostPath: + path: /etc/rancher/logging/logs/ + - name: config + configMap: + name: "{{ .Release.Name }}-rke2" +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: "{{ .Release.Name }}-rke2-journald-aggregator" + namespace: "{{ .Release.Namespace }}" +{{- if .Values.global.psp.enabled }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: "{{ .Release.Name }}-rke2-journald-aggregator" +rules: + - apiGroups: + - policy + resourceNames: + - "{{ .Release.Name }}-rke2-journald-aggregator" + resources: + - podsecuritypolicies + verbs: + - use +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: "{{ .Release.Name }}-rke2-journald-aggregator" +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: "{{ .Release.Name }}-rke2-journald-aggregator" +subjects: + - kind: ServiceAccount + name: "{{ .Release.Name }}-rke2-journald-aggregator" +--- +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: "{{ .Release.Name }}-rke2-journald-aggregator" + namespace: "{{ .Release.Namespace }}" +spec: + allowPrivilegeEscalation: false + allowedHostPaths: + - pathPrefix: /etc/rancher/logging/logs + readOnly: false + fsGroup: + rule: RunAsAny + readOnlyRootFilesystem: true + runAsUser: + rule: RunAsAny + seLinux: + rule: RunAsAny + supplementalGroups: + rule: RunAsAny + volumes: + - configMap + - emptyDir + - secret + - hostPath +{{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-containers.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-containers.yaml new file mode 100755 index 000000000..2bc1900ce --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-containers.yaml @@ -0,0 +1,63 @@ +{{- if .Values.additionalLoggingSources.rke2.enabled }} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-rke2-containers + namespace: {{ .Release.Namespace }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "rke2" + Path: "/var/log/containers/*rke*.log" + extraVolumeMounts: + - source: "/var/log/containers/" + destination: "/var/log/containers/" + readOnly: true + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-journald.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-journald.yaml new file mode 100755 index 000000000..72ac37bab --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/rke2/logging-rke2-journald.yaml @@ -0,0 +1,63 @@ +{{- if .Values.additionalLoggingSources.rke2.enabled }} +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }}-rke2-journald + namespace: {{ .Release.Namespace }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + inputTail: + Tag: "rke2" + Path: "/etc/rancher/logging/logs/*.log" + extraVolumeMounts: + - source: "/etc/rancher/logging/logs/" + destination: "/etc/rancher/logging/logs/" + readOnly: true + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/root/logging.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/root/logging.yaml new file mode 100755 index 000000000..f320cdde4 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/loggings/root/logging.yaml @@ -0,0 +1,59 @@ +apiVersion: logging.banzaicloud.io/v1beta1 +kind: Logging +metadata: + name: {{ .Release.Name }} + namespace: {{ .Release.Namespace }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + controlNamespace: {{ .Release.Namespace }} + fluentbit: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentbit.repository }} + tag: {{ .Values.images.fluentbit.tag }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- if .Values.global.dockerRootDirectory }} + mountPath: {{ .Values.global.dockerRootDirectory }} + {{- end }} + {{- $total_tolerations := concat (.Values.tolerations) (.Values.fluentbit.tolerations) }} + {{- with $total_tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentbit.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} + fluentd: + image: + repository: {{ template "system_default_registry" . }}{{ .Values.images.fluentd.repository }} + tag: {{ .Values.images.fluentd.tag }} + configReloaderImage: + repository: {{ template "system_default_registry" . }}{{ .Values.images.config_reloader.repository }} + tag: {{ .Values.images.config_reloader.tag }} + disablePvc: {{ .Values.disablePvc }} + {{- if .Values.global.psp.enabled }} + security: + podSecurityPolicyCreate: true + roleBasedAccessControlCreate: true + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.fluentd.resources }} + resources: + {{- toYaml . | nindent 6 }} + {{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/psp.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/psp.yaml new file mode 100755 index 000000000..d0eab300c --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/psp.yaml @@ -0,0 +1,33 @@ +{{ if and .Values.rbac.enabled .Values.rbac.psp.enabled }} +apiVersion: policy/v1beta1 +kind: PodSecurityPolicy +metadata: + name: psp.logging-operator + namespace: {{ include "logging-operator.namespace" . }} + annotations: + seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default,runtime/default' + seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default,runtime/default' + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + readOnlyRootFilesystem: true + privileged: false + allowPrivilegeEscalation: false + runAsUser: + rule: MustRunAsNonRoot + fsGroup: + rule: MustRunAs + ranges: + - min: 1 + max: 65535 + supplementalGroups: + rule: MustRunAs + ranges: + - min: 1 + max: 65535 + seLinux: + rule: RunAsAny + volumes: + - secret + - configMap +{{ end }} \ No newline at end of file diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/service.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/service.yaml new file mode 100755 index 000000000..f419ae2c4 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/service.yaml @@ -0,0 +1,20 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "logging-operator.fullname" . }} + namespace: {{ include "logging-operator.namespace" . }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +spec: + type: ClusterIP + {{- with .Values.http.service.clusterIP }} + clusterIP: {{ . }} + {{- end }} + ports: + - port: {{ .Values.http.port }} + targetPort: http + protocol: TCP + name: http + selector: + app.kubernetes.io/name: {{ include "logging-operator.name" . }} + app.kubernetes.io/instance: {{ .Release.Name }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceMonitor.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceMonitor.yaml new file mode 100755 index 000000000..1bb762cde --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceMonitor.yaml @@ -0,0 +1,30 @@ +{{ if .Values.monitoring.serviceMonitor.enabled }} +apiVersion: monitoring.coreos.com/v1 +kind: ServiceMonitor +metadata: + name: {{ include "logging-operator.fullname" . }} + namespace: {{ include "logging-operator.namespace" . }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +{{- with .Values.monitoring.serviceMonitor.additionalLabels }} + {{- toYaml . | nindent 4 }} +{{- end }} +spec: + selector: + matchLabels: +{{ include "logging-operator.labels" . | indent 6 }} + endpoints: + - port: http + path: /metrics + {{- with .Values.monitoring.serviceMonitor.metricsRelabelings }} + metricRelabelings: + {{- toYaml . | nindent 6 }} + {{- end }} + {{- with .Values.monitoring.serviceMonitor.relabelings }} + relabelings: + {{- toYaml . | nindent 4 }} + {{- end }} + namespaceSelector: + matchNames: + - {{ include "logging-operator.namespace" . }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceaccount.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceaccount.yaml new file mode 100755 index 000000000..cbb2a94b4 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/serviceaccount.yaml @@ -0,0 +1,10 @@ +{{- if .Values.rbac.enabled }} +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ template "logging-operator.fullname" . }} + namespace: {{ include "logging-operator.namespace" . }} + labels: +{{ include "logging-operator.labels" . | indent 4 }} +{{- end }} diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/userroles.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/userroles.yaml new file mode 100755 index 000000000..f4136b09a --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/userroles.yaml @@ -0,0 +1,35 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: "logging-admin" + labels: + rbac.authorization.k8s.io/aggregate-to-admin: "true" +rules: + - apiGroups: + - "logging.banzaicloud.io" + resources: + - flows + - outputs + verbs: + - "*" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: "logging-view" + labels: + rbac.authorization.k8s.io/aggregate-to-admin: "true" + rbac.authorization.k8s.io/aggregate-to-view: "true" + rbac.authorization.k8s.io/aggregate-to-edit: "true" +rules: + - apiGroups: + - "logging.banzaicloud.io" + resources: + - flows + - outputs + - clusterflows + - clusteroutputs + verbs: + - get + - list + - watch diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/validate-install-crd.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/validate-install-crd.yaml new file mode 100755 index 000000000..66e8725e5 --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/templates/validate-install-crd.yaml @@ -0,0 +1,18 @@ +#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} +# {{- $found := dict -}} +# {{- set $found "logging.banzaicloud.io/v1beta1/ClusterFlow" false -}} +# {{- set $found "logging.banzaicloud.io/v1beta1/ClusterOutput" false -}} +# {{- set $found "logging.banzaicloud.io/v1beta1/Flow" false -}} +# {{- set $found "logging.banzaicloud.io/v1beta1/Logging" false -}} +# {{- set $found "logging.banzaicloud.io/v1beta1/Output" false -}} +# {{- range .Capabilities.APIVersions -}} +# {{- if hasKey $found (toString .) -}} +# {{- set $found (toString .) true -}} +# {{- end -}} +# {{- end -}} +# {{- range $_, $exists := $found -}} +# {{- if (eq $exists false) -}} +# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}} +# {{- end -}} +# {{- end -}} +#{{- end -}} \ No newline at end of file diff --git a/charts/rancher-logging/rancher-logging/3.9.000-rc06/values.yaml b/charts/rancher-logging/rancher-logging/3.9.000-rc06/values.yaml new file mode 100755 index 000000000..849b6417a --- /dev/null +++ b/charts/rancher-logging/rancher-logging/3.9.000-rc06/values.yaml @@ -0,0 +1,149 @@ +# Default values for logging-operator. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +replicaCount: 1 + +image: + repository: rancher/banzaicloud-logging-operator + tag: 3.9.0 + pullPolicy: IfNotPresent + +imagePullSecrets: [] +nameOverride: "" +fullnameOverride: "" +namespaceOverride: "" + +annotations: {} + +## Deploy CRDs used by Logging Operator. +## +createCustomResource: false + +resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +nodeSelector: + kubernetes.io/os: linux + +tolerations: + - key: cattle.io/os + operator: "Equal" + value: "linux" + effect: NoSchedule + +affinity: {} + +http: + # http listen port number + port: 8080 + # Service definition for query http service + service: + type: ClusterIP + clusterIP: None + # Annotations to query http service + annotations: {} + # Labels to query http service + labels: {} + +# These "rbac" settings match the upstream defaults. For only using psp in the overlay files, which +# include the default Logging CRs created, see the "global.psp" setting. To enable psp for the entire +# chart, enable both "rbac.psp" and "global.psp" (this may require further changes to the chart). +rbac: + enabled: true + psp: + enabled: false + +## SecurityContext holds pod-level security attributes and common container settings. +## This defaults to non root user with uid 1000 and gid 2000. *v1.PodSecurityContext false +## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ +## +podSecurityContext: {} +# runAsNonRoot: true +# runAsUser: 1000 +# fsGroup: 2000 +securityContext: {} +# allowPrivilegeEscalation: false +# readOnlyRootFilesystem: true + # capabilities: + # drop: ["ALL"] + +## Operator priorityClassName +## +priorityClassName: {} + +monitoring: + # Create a Prometheus Operator ServiceMonitor object + serviceMonitor: + enabled: false + additionalLabels: {} + metricRelabelings: [] + relabelings: [] + +disablePvc: true + +additionalLoggingSources: + rke: + enabled: false + fluentbit: + log_level: "info" + mem_buffer_limit: "5MB" + rke2: + enabled: false + k3s: + enabled: false + container_engine: "systemd" + aks: + enabled: false + eks: + enabled: false + gke: + enabled: false + +images: + config_reloader: + repository: rancher/jimmidyson-configmap-reload + tag: v0.4.0 + fluentbit: + repository: rancher/fluent-fluent-bit + tag: 1.6.10 + fluentbit_debug: + repository: rancher/fluent-fluent-bit + tag: 1.6.10-debug + fluentd: + repository: rancher/banzaicloud-fluentd + tag: v1.11.5-alpine-9 + +# These "fluentd" and "fluentbit" settings apply to every Logging CR, including vendor Logging CRs +# enabled in "additionalLoggingSources". Changing these affects every Logging CR installed. +fluentd: + resources: {} +fluentbit: + resources: {} + tolerations: + - key: node-role.kubernetes.io/controlplane + value: "true" + effect: NoSchedule + - key: node-role.kubernetes.io/etcd + value: "true" + effect: NoExecute + +global: + cattle: + systemDefaultRegistry: "" + # Change the "dockerRootDirectory" if the default Docker directory has changed. + dockerRootDirectory: "" + # This psp setting differs from the upstream "rbac.psp" by only enabling psp settings for the + # overlay files, which include the Logging CRs created, whereas the upstream "rbac.psp" affects the + # logging operator. + psp: + enabled: true diff --git a/index.yaml b/index.yaml index d1fe208b0..ede392734 100755 --- a/index.yaml +++ b/index.yaml @@ -2444,6 +2444,30 @@ entries: - released/assets/rancher-kiali-server/rancher-kiali-server-crd-1.23.001.tgz version: 1.23.001 rancher-logging: + - annotations: + catalog.cattle.io/auto-install: rancher-logging-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Logging + catalog.cattle.io/namespace: cattle-logging-system + catalog.cattle.io/os: linux + catalog.cattle.io/provides-gvr: logging.banzaicloud.io.clusterflow/v1beta1 + catalog.cattle.io/release-name: rancher-logging + catalog.cattle.io/ui-component: logging + apiVersion: v1 + appVersion: 3.9.0 + created: "2021-02-18T20:54:14.834317809Z" + description: Collects and filter logs using highly configurable CRDs. Powered + by Banzai Cloud Logging Operator. + digest: 90596ebd741c5bd712796d8dd07954663e76e41adad3c8f5177176414d355492 + icon: https://charts.rancher.io/assets/logos/logging.svg + keywords: + - logging + - monitoring + - security + name: rancher-logging + urls: + - assets/rancher-logging/rancher-logging-3.9.000-rc06.tgz + version: 3.9.000-rc06 - annotations: catalog.cattle.io/auto-install: rancher-logging-crd=match catalog.cattle.io/certified: rancher @@ -2708,6 +2732,20 @@ entries: - released/assets/rancher-logging/rancher-logging-3.6.000.tgz version: 3.6.000 rancher-logging-crd: + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: cattle-logging-system + catalog.cattle.io/release-name: rancher-logging-crd + apiVersion: v1 + created: "2021-02-18T20:54:14.844695021Z" + description: Installs the CRDs for rancher-logging. + digest: c8bec736459bb23bbc1359c54181aa12671908bc67258332843b812527130441 + name: rancher-logging-crd + type: application + urls: + - assets/rancher-logging/rancher-logging-crd-3.9.000-rc06.tgz + version: 3.9.000-rc06 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true"