-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: (IAC-397) Add password setting support for kibana new user logadm #263
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A questions and general comment. But looks good.
tags: | ||
- install | ||
|
||
- name: cluster-logging - output credentials | ||
debug: | ||
msg: | ||
- "OpenSearch admin - username: admin, password: {{ V4M_KIBANA_PASSWORD }}" | ||
- "OpenSearch admin - username: logadm, password: {{ V4M_KIBANA_LOGADM_PASSWORD }}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Spacing is off in the alignment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed the spacing issue.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
Changes:
viya4-monitoring-kubernetes added a new user 'logadm' as a day-to-day user for log monitoring for cluster administrators. Changes in this PR help user in setting password for this new user logadm.
To set the password for the
logadm
user, set theV4M_KIBANA_LOGADM_PASSWORD
variable in ansible-vars file. If no password has been set for thelogadm
user, but a password has been set for theadmin
user (by using theV4M_KIBANA_PASSWORD
variable), then that password is used for thelogadm
user also. If neither password has been set, random passwords are generated for these accounts. These random passwords are displayed in the log messages generated during the deployment process.Tests:
Following scenarios were verified. See internal ticket for details.