You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Merge branch 'fidel-ruiz/feat-add-support-logs-agent-resources' of github.com:fidel-ibm/terraform-ibm-observability-agents into fidel-ruiz/feat-add-support-logs-agent-resources
Copy file name to clipboardExpand all lines: README.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -124,19 +124,19 @@ You need the following permissions to run this module.
124
124
| <aname="input_cloud_monitoring_agent_name"></a> [cloud\_monitoring\_agent\_name](#input\_cloud\_monitoring\_agent\_name)| Cloud Monitoring agent name. Used for naming all kubernetes and helm resources on the cluster. |`string`|`"sysdig-agent"`| no |
125
125
| <aname="input_cloud_monitoring_agent_namespace"></a> [cloud\_monitoring\_agent\_namespace](#input\_cloud\_monitoring\_agent\_namespace)| Namespace where to deploy the Cloud Monitoring agent. Default value is 'ibm-observe' |`string`|`"ibm-observe"`| no |
126
126
| <aname="input_cloud_monitoring_agent_tags"></a> [cloud\_monitoring\_agent\_tags](#input\_cloud\_monitoring\_agent\_tags)| List of tags to associate to all matrics that the agent collects. NOTE: Use the 'cloud\_monitoring\_add\_cluster\_name' variable to add the cluster name as a tag. |`list(string)`|`[]`| no |
127
-
| <aname="input_cloud_monitoring_agent_tolerations"></a> [cloud\_monitoring\_agent\_tolerations](#input\_cloud\_monitoring\_agent\_tolerations)| List of tolerations to apply to Cloud Monitoring agent. | <pre>list(object({<br> key = optional(string)<br> operator = optional(string)<br> value = optional(string)<br> effect = optional(string)<br> tolerationSeconds = optional(number)<br> }))</pre> | <pre>[<br> {<br> "operator": "Exists"<br> },<br> {<br> "effect": "NoSchedule",<br> "key": "node-role.kubernetes.io/master",<br> "operator": "Exists"<br> }<br>]</pre> | no |
128
-
| <aname="input_cloud_monitoring_container_filter"></a> [cloud\_monitoring\_container\_filter](#input\_cloud\_monitoring\_container\_filter)| To filter custom containers, specify which containers to include or exclude from metrics collection for the cloud monitoring agent. See https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_kube_agent#change_kube_agent_filter_data.| <pre>list(object({<br> type = string<br> parameter = string<br> name = string<br> }))</pre> |`[]`| no |
127
+
| <aname="input_cloud_monitoring_agent_tolerations"></a> [cloud\_monitoring\_agent\_tolerations](#input\_cloud\_monitoring\_agent\_tolerations)| List of tolerations to apply to Cloud Monitoring agent. | <pre>list(object({<br/> key = optional(string)<br/> operator = optional(string)<br/> value = optional(string)<br/> effect = optional(string)<br/> tolerationSeconds = optional(number)<br/> }))</pre> | <pre>[<br/> {<br/> "operator": "Exists"<br/> },<br/> {<br/> "effect": "NoSchedule",<br/> "key": "node-role.kubernetes.io/master",<br/> "operator": "Exists"<br/> }<br/>]</pre> | no |
128
+
| <aname="input_cloud_monitoring_container_filter"></a> [cloud\_monitoring\_container\_filter](#input\_cloud\_monitoring\_container\_filter)| To filter custom containers, specify which containers to include or exclude from metrics collection for the cloud monitoring agent. See https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_kube_agent#change_kube_agent_filter_data.| <pre>list(object({<br/> type = string<br/> parameter = string<br/> name = string<br/> }))</pre> |`[]`| no |
129
129
| <aname="input_cloud_monitoring_enabled"></a> [cloud\_monitoring\_enabled](#input\_cloud\_monitoring\_enabled)| Deploy IBM Cloud Monitoring agent |`bool`|`true`| no |
130
130
| <aname="input_cloud_monitoring_endpoint_type"></a> [cloud\_monitoring\_endpoint\_type](#input\_cloud\_monitoring\_endpoint\_type)| Specify the IBM Cloud Monitoring instance endpoint type (public or private) to use. Used to construct the ingestion endpoint. |`string`|`"private"`| no |
131
131
| <aname="input_cloud_monitoring_instance_region"></a> [cloud\_monitoring\_instance\_region](#input\_cloud\_monitoring\_instance\_region)| The IBM Cloud Monitoring instance region. Used to construct the ingestion endpoint. |`string`|`null`| no |
132
-
| <aname="input_cloud_monitoring_metrics_filter"></a> [cloud\_monitoring\_metrics\_filter](#input\_cloud\_monitoring\_metrics\_filter)| To filter custom metrics, specify the Cloud Monitoring metrics to include or to exclude. See https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_kube_agent#change_kube_agent_inc_exc_metrics.| <pre>list(object({<br> type = string<br> name = string<br> }))</pre> |`[]`| no |
132
+
| <aname="input_cloud_monitoring_metrics_filter"></a> [cloud\_monitoring\_metrics\_filter](#input\_cloud\_monitoring\_metrics\_filter)| To filter custom metrics, specify the Cloud Monitoring metrics to include or to exclude. See https://cloud.ibm.com/docs/monitoring?topic=monitoring-change_kube_agent#change_kube_agent_inc_exc_metrics.| <pre>list(object({<br/> type = string<br/> name = string<br/> }))</pre> |`[]`| no |
133
133
| <aname="input_cloud_monitoring_secret_name"></a> [cloud\_monitoring\_secret\_name](#input\_cloud\_monitoring\_secret\_name)| The name of the secret which will store the access key. |`string`|`"sysdig-agent"`| no |
134
134
| <aname="input_cluster_config_endpoint_type"></a> [cluster\_config\_endpoint\_type](#input\_cluster\_config\_endpoint\_type)| Specify which type of endpoint to use for for cluster config access: 'default', 'private', 'vpe', 'link'. 'default' value will use the default endpoint of the cluster. |`string`|`"default"`| no |
135
135
| <aname="input_cluster_id"></a> [cluster\_id](#input\_cluster\_id)| The ID of the cluster you wish to deploy the agents in |`string`| n/a | yes |
136
136
| <aname="input_cluster_resource_group_id"></a> [cluster\_resource\_group\_id](#input\_cluster\_resource\_group\_id)| The Resource Group ID of the cluster |`string`| n/a | yes |
137
137
| <aname="input_is_vpc_cluster"></a> [is\_vpc\_cluster](#input\_is\_vpc\_cluster)| Specify true if the target cluster for the observability agents is a VPC cluster, false if it is a classic cluster. |`bool`|`true`| no |
138
138
| <aname="input_logs_agent_additional_log_source_paths"></a> [logs\_agent\_additional\_log\_source\_paths](#input\_logs\_agent\_additional\_log\_source\_paths)| The list of additional log sources. By default, the Logs agent collects logs from a single source at `/var/log/containers/*.log`. |`list(string)`|`[]`| no |
139
-
| <aname="input_logs_agent_additional_metadata"></a> [logs\_agent\_additional\_metadata](#input\_logs\_agent\_additional\_metadata)| The list of additional metadata fields to add to the routed logs. | <pre>list(object({<br> key = optional(string)<br> value = optional(string)<br> }))</pre> |`[]`| no |
139
+
| <aname="input_logs_agent_additional_metadata"></a> [logs\_agent\_additional\_metadata](#input\_logs\_agent\_additional\_metadata)| The list of additional metadata fields to add to the routed logs. | <pre>list(object({<br/> key = optional(string)<br/> value = optional(string)<br/> }))</pre> |`[]`| no |
140
140
| <aname="input_logs_agent_enable_scc"></a> [logs\_agent\_enable\_scc](#input\_logs\_agent\_enable\_scc)| Whether to enable creation of Security Context Constraints in Openshift. When installing on an OpenShift cluster, this setting is mandatory to configure permissions for pods within your cluster. |`bool`|`true`| no |
141
141
| <aname="input_logs_agent_enabled"></a> [logs\_agent\_enabled](#input\_logs\_agent\_enabled)| Whether to deploy the Logs agent. |`bool`|`true`| no |
142
142
| <aname="input_logs_agent_exclude_log_source_paths"></a> [logs\_agent\_exclude\_log\_source\_paths](#input\_logs\_agent\_exclude\_log\_source\_paths)| The list of log sources to exclude. Specify the paths that the Logs agent ignores. |`list(string)`|`[]`| no |
@@ -146,9 +146,9 @@ You need the following permissions to run this module.
146
146
| <aname="input_logs_agent_log_source_namespaces"></a> [logs\_agent\_log\_source\_namespaces](#input\_logs\_agent\_log\_source\_namespaces)| The list of namespaces from which logs should be forwarded by agent. If namespaces are not listed, logs from all namespaces will be sent. |`list(string)`|`[]`| no |
147
147
| <aname="input_logs_agent_name"></a> [logs\_agent\_name](#input\_logs\_agent\_name)| The name of the Logs agent. The name is used in all Kubernetes and Helm resources in the cluster. |`string`|`"logs-agent"`| no |
148
148
| <aname="input_logs_agent_namespace"></a> [logs\_agent\_namespace](#input\_logs\_agent\_namespace)| The namespace where the Logs agent is deployed. The default value is `ibm-observe`. |`string`|`"ibm-observe"`| no |
| <aname="input_logs_agent_selected_log_source_paths"></a> [logs\_agent\_selected\_log\_source\_paths](#input\_logs\_agent\_selected\_log\_source\_paths)| The list of specific log sources paths. Logs will only be collected from the specified log source paths. If no paths are specified, it will send logs from `/var/log/containers`. |`list(string)`|`[]`| no |
151
-
| <aname="input_logs_agent_tolerations"></a> [logs\_agent\_tolerations](#input\_logs\_agent\_tolerations)| List of tolerations to apply to Logs agent. The default value means a pod will run on every node. | <pre>list(object({<br> key = optional(string)<br> operator = optional(string)<br> value = optional(string)<br> effect = optional(string)<br> tolerationSeconds = optional(number)<br> }))</pre> | <pre>[<br> {<br> "operator": "Exists"<br> }<br>]</pre> | no |
151
+
| <aname="input_logs_agent_tolerations"></a> [logs\_agent\_tolerations](#input\_logs\_agent\_tolerations)| List of tolerations to apply to Logs agent. The default value means a pod will run on every node. | <pre>list(object({<br/> key = optional(string)<br/> operator = optional(string)<br/> value = optional(string)<br/> effect = optional(string)<br/> tolerationSeconds = optional(number)<br/> }))</pre> | <pre>[<br/> {<br/> "operator": "Exists"<br/> }<br/>]</pre> | no |
152
152
| <aname="input_logs_agent_trusted_profile"></a> [logs\_agent\_trusted\_profile](#input\_logs\_agent\_trusted\_profile)| The IBM Cloud trusted profile ID. Used only when `logs_agent_iam_mode` is set to `TrustedProfile`. The trusted profile must have an IBM Cloud Logs `Sender` role. |`string`|`null`| no |
153
153
| <aname="input_wait_till"></a> [wait\_till](#input\_wait\_till)| To avoid long wait times when you run your Terraform code, you can specify the stage when you want Terraform to mark the cluster resource creation as completed. Depending on what stage you choose, the cluster creation might not be fully completed and continues to run in the background. However, your Terraform code can continue to run without waiting for the cluster to be fully created. Supported args are `MasterNodeReady`, `OneWorkerNodeReady`, `IngressReady` and `Normal`|`string`|`"Normal"`| no |
154
154
| <aname="input_wait_till_timeout"></a> [wait\_till\_timeout](#input\_wait\_till\_timeout)| Timeout for wait\_till in minutes. |`number`|`90`| no |
Copy file name to clipboardExpand all lines: modules/logs-agent/README.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ No modules.
87
87
| <aname="input_cluster_resource_group_id"></a> [cluster\_resource\_group\_id](#input\_cluster\_resource\_group\_id)| The resource group ID of the cluster. |`string`| n/a | yes |
88
88
| <aname="input_is_vpc_cluster"></a> [is\_vpc\_cluster](#input\_is\_vpc\_cluster)| Specify true if the target cluster for the agents is a VPC cluster, false if it is a classic cluster. |`bool`|`true`| no |
89
89
| <aname="input_logs_agent_additional_log_source_paths"></a> [logs\_agent\_additional\_log\_source\_paths](#input\_logs\_agent\_additional\_log\_source\_paths)| The list of additional log sources. By default, the Logs agent collects logs from a single source at `/var/log/containers/*.log`. |`list(string)`|`[]`| no |
90
-
| <aname="input_logs_agent_additional_metadata"></a> [logs\_agent\_additional\_metadata](#input\_logs\_agent\_additional\_metadata)| The list of additional metadata fields to add to the routed logs. | <pre>list(object({<br> key = optional(string)<br> value = optional(string)<br> }))</pre> |`[]`| no |
90
+
| <aname="input_logs_agent_additional_metadata"></a> [logs\_agent\_additional\_metadata](#input\_logs\_agent\_additional\_metadata)| The list of additional metadata fields to add to the routed logs. | <pre>list(object({<br/> key = optional(string)<br/> value = optional(string)<br/> }))</pre> |`[]`| no |
91
91
| <aname="input_logs_agent_enable_scc"></a> [logs\_agent\_enable\_scc](#input\_logs\_agent\_enable\_scc)| Whether to enable creation of Security Context Constraints in Openshift. When installing on an OpenShift cluster, this setting is mandatory to configure permissions for pods within your cluster. |`bool`|`true`| no |
92
92
| <aname="input_logs_agent_exclude_log_source_paths"></a> [logs\_agent\_exclude\_log\_source\_paths](#input\_logs\_agent\_exclude\_log\_source\_paths)| The list of log sources to exclude. Specify the paths that the Logs agent ignores. |`list(string)`|`[]`| no |
93
93
| <aname="input_logs_agent_iam_api_key"></a> [logs\_agent\_iam\_api\_key](#input\_logs\_agent\_iam\_api\_key)| The IBM Cloud API key for the Logs agent to authenticate and communicate with the IBM Cloud Logs. It is required if `logs_agent_iam_mode` is set to `IAMAPIKey`. |`string`|`null`| no |
@@ -96,9 +96,9 @@ No modules.
96
96
| <aname="input_logs_agent_log_source_namespaces"></a> [logs\_agent\_log\_source\_namespaces](#input\_logs\_agent\_log\_source\_namespaces)| The list of namespaces from which logs should be forwarded by agent. If namespaces are not listed, logs from all namespaces will be sent. |`list(string)`|`[]`| no |
97
97
| <aname="input_logs_agent_name"></a> [logs\_agent\_name](#input\_logs\_agent\_name)| The name of the Logs agent. The name is used in all Kubernetes and Helm resources in the cluster. |`string`|`"logs-agent"`| no |
98
98
| <aname="input_logs_agent_namespace"></a> [logs\_agent\_namespace](#input\_logs\_agent\_namespace)| The namespace where the Logs agent is deployed. The default value is `ibm-observe`. |`string`|`"ibm-observe"`| no |
| <aname="input_logs_agent_selected_log_source_paths"></a> [logs\_agent\_selected\_log\_source\_paths](#input\_logs\_agent\_selected\_log\_source\_paths)| The list of specific log sources paths. Logs will only be collected from the specified log source paths. If no paths are specified, it will send logs from `/var/log/containers`. |`list(string)`|`[]`| no |
101
-
| <aname="input_logs_agent_tolerations"></a> [logs\_agent\_tolerations](#input\_logs\_agent\_tolerations)| List of tolerations to apply to Logs agent. The default value means a pod will run on every node. | <pre>list(object({<br> key = optional(string)<br> operator = optional(string)<br> value = optional(string)<br> effect = optional(string)<br> tolerationSeconds = optional(number)<br> }))</pre> | <pre>[<br> {<br> "operator": "Exists"<br> }<br>]</pre> | no |
101
+
| <aname="input_logs_agent_tolerations"></a> [logs\_agent\_tolerations](#input\_logs\_agent\_tolerations)| List of tolerations to apply to Logs agent. The default value means a pod will run on every node. | <pre>list(object({<br/> key = optional(string)<br/> operator = optional(string)<br/> value = optional(string)<br/> effect = optional(string)<br/> tolerationSeconds = optional(number)<br/> }))</pre> | <pre>[<br/> {<br/> "operator": "Exists"<br/> }<br/>]</pre> | no |
102
102
| <aname="input_logs_agent_trusted_profile"></a> [logs\_agent\_trusted\_profile](#input\_logs\_agent\_trusted\_profile)| The IBM Cloud trusted profile ID. Used only when `logs_agent_iam_mode` is set to `TrustedProfile`. The trusted profile must have an IBM Cloud Logs `Sender` role. |`string`|`null`| no |
103
103
| <aname="input_wait_till"></a> [wait\_till](#input\_wait\_till)| To avoid long wait times when you run your Terraform code, you can specify the stage when you want Terraform to mark the cluster resource creation as completed. Depending on what stage you choose, the cluster creation might not be fully completed and continues to run in the background. However, your Terraform code can continue to run without waiting for the cluster to be fully created. Supported args are `MasterNodeReady`, `OneWorkerNodeReady`, `IngressReady` and `Normal`|`string`|`"Normal"`| no |
104
104
| <aname="input_wait_till_timeout"></a> [wait\_till\_timeout](#input\_wait\_till\_timeout)| Timeout for wait\_till in minutes. |`number`|`90`| no |
0 commit comments