Documentation ¶
Index ¶
- Constants
- func AddSecretVolumeMounts(collector *v1.Container, secretNames []string)
- func AddSecretVolumes(podSpec *v1.PodSpec, pipelineSpec logging.ClusterLogForwarderSpec) []string
- func AddSecurityContextTo(container *v1.Container) *v1.Container
- func AddWebIdentityTokenEnvVars(collector *v1.Container, output logging.OutputSpec, secret *v1.Secret)
- func AddWebIdentityTokenVolumes(collector *v1.Container, podSpec *v1.PodSpec)
- func CalcTrustedCAHashValue(configMap *corev1.ConfigMap) (string, error)
- func GetTrustedCABundle(k8sClient client.Client, namespace, name string) (*corev1.ConfigMap, string)
- func OutputSecretPath(secretName string) string
- func ReconcileTrustedCABundleConfigMap(er record.EventRecorder, k8sClient client.Client, namespace, name string, ...) error
- func Remove(k8sClient client.Client, namespace, name string) (err error)
- func RemoveDeployment(k8sClient client.Client, namespace, name string) (err error)
- type CommonLabelVisitor
- type Factory
- func (f *Factory) CollectorResourceRequirements() v1.ResourceRequirements
- func (f *Factory) NewCollectorContainer(secretNames []string, clusterID string, receiverInputs []string) *v1.Container
- func (f *Factory) NewDaemonSet(namespace, name string, trustedCABundle *v1.ConfigMap, ...) *apps.DaemonSet
- func (f *Factory) NewDeployment(namespace, name string, trustedCABundle *v1.ConfigMap, ...) *apps.Deployment
- func (f *Factory) NewPodSpec(trustedCABundle *v1.ConfigMap, forwarderSpec logging.ClusterLogForwarderSpec, ...) *v1.PodSpec
- func (f *Factory) NodeSelector() map[string]string
- func (f *Factory) ReconcileCollectorConfig(er record.EventRecorder, k8sClient client.Client, reader client.Reader, ...) error
- func (f *Factory) ReconcileDaemonset(er record.EventRecorder, k8sClient client.Client, namespace string, ...) error
- func (f *Factory) ReconcileDeployment(er record.EventRecorder, k8sClient client.Client, namespace string, ...) error
- func (f *Factory) ReconcileInputServices(er record.EventRecorder, k8sClient client.Client, ...) error
- func (f *Factory) Tolerations() []v1.Toleration
- type PodLabelVisitor
- type Visitor
Constants ¶
const ( MetricsPort = int32(24231) MetricsPortName = "metrics" )
Variables ¶
This section is empty.
Functions ¶
func AddSecretVolumeMounts ¶
AddSecretVolumeMounts to the collector container
func AddSecretVolumes ¶
func AddSecretVolumes(podSpec *v1.PodSpec, pipelineSpec logging.ClusterLogForwarderSpec) []string
AddSecretVolumes adds secret volumes to the pod spec for the unique set of pipeline secrets and returns the list of the secret names
func AddWebIdentityTokenEnvVars ¶
func AddWebIdentityTokenEnvVars(collector *v1.Container, output logging.OutputSpec, secret *v1.Secret)
AddWebIdentityTokenEnvVars Appends web identity env vars based on attributes of the secret and forwarder spec
func AddWebIdentityTokenVolumes ¶
AddWebIdentityTokenVolumes Appends web identity volumes based on attributes of the secret and forwarder spec
func CalcTrustedCAHashValue ¶
func GetTrustedCABundle ¶
func OutputSecretPath ¶
func ReconcileTrustedCABundleConfigMap ¶
func ReconcileTrustedCABundleConfigMap(er record.EventRecorder, k8sClient client.Client, namespace, name string, owner metav1.OwnerReference) error
ReconcileTrustedCABundleConfigMap creates or returns an existing Trusted CA Bundle ConfigMap. By setting label "config.openshift.io/inject-trusted-cabundle: true", the cert is automatically filled/updated.
Types ¶
type CommonLabelVisitor ¶
type Factory ¶
type Factory struct { ConfigHash string CollectorSpec logging.CollectionSpec CollectorType logging.LogCollectionType ClusterID string ImageName string TrustedCAHash string Visit Visitor Secrets map[string]*v1.Secret ForwarderSpec logging.ClusterLogForwarderSpec CommonLabelInitializer CommonLabelVisitor PodLabelVisitor PodLabelVisitor ResourceNames *factory.ForwarderResourceNames LogLevel string // contains filtered or unexported fields }
func New ¶
func New(confHash, clusterID string, collectorSpec logging.CollectionSpec, secrets map[string]*v1.Secret, forwarderSpec logging.ClusterLogForwarderSpec, instanceName string, resNames *factory.ForwarderResourceNames, isDaemonset bool, logLevel string) *Factory
func (*Factory) CollectorResourceRequirements ¶
func (f *Factory) CollectorResourceRequirements() v1.ResourceRequirements
CollectorResourceRequirements returns the resource requirements for a given collector implementation or it's default if none are specified
func (*Factory) NewCollectorContainer ¶
func (f *Factory) NewCollectorContainer(secretNames []string, clusterID string, receiverInputs []string) *v1.Container
NewCollectorContainer is a constructor for creating the collector container spec. Note the secretNames are assumed to be a unique list
func (*Factory) NewDaemonSet ¶
func (*Factory) NewDeployment ¶
func (f *Factory) NewDeployment(namespace, name string, trustedCABundle *v1.ConfigMap, tlsProfileSpec configv1.TLSProfileSpec, receiverInputs []string) *apps.Deployment
func (*Factory) NewPodSpec ¶
func (*Factory) NodeSelector ¶
func (*Factory) ReconcileCollectorConfig ¶
func (f *Factory) ReconcileCollectorConfig(er record.EventRecorder, k8sClient client.Client, reader client.Reader, namespace, collectorConfig string, owner metav1.OwnerReference) error
ReconcileCollectorConfig reconciles a collector config specifically for the collector defined by the factory
func (*Factory) ReconcileDaemonset ¶
func (f *Factory) ReconcileDaemonset(er record.EventRecorder, k8sClient client.Client, namespace string, owner metav1.OwnerReference) error
ReconcileDaemonset reconciles a daemonset specifically for the collector defined by the factory
func (*Factory) ReconcileDeployment ¶
func (f *Factory) ReconcileDeployment(er record.EventRecorder, k8sClient client.Client, namespace string, owner metav1.OwnerReference) error
ReconcileDeployment reconciles a deployment specifically for the collector defined by the factory
func (*Factory) ReconcileInputServices ¶
func (*Factory) Tolerations ¶
func (f *Factory) Tolerations() []v1.Toleration