Preparing to collect logs by enabling BMC Helix logging
Before you begin
- Make sure that you have created a namespace.
For more information, see Creating-a-namespace-for-deploying-BMC-Helix-IT-Operations-Management . Make sure that the following ports are available for Elasticsearch and Kibana services:
To prepare to collect logs by enabling BMC Helix Logging
In the helix-on-prem-deployment-manager-<release_version>/ configs /deployment.config file, change the value of the BMC_HELIX_LOGGING parameter to yes:
BMC_HELIX_LOGGING=yesRun the following command to get the Kibana configmap:
kubectl -n <namespace> get cm | grep efk-elasticsearch-kibana-conf- In the helix-on-prem-deployment-manager/configs/bmc-helix-logging.config file, set the value of the ESKIBANA_SERVER_HOST parameter:
- To use IPv4, set the value of ESKIBANA_SERVER_HOST as "0.0.0.0"
ESKIBANA_SERVER_HOST="0.0.0.0" - To use IPv6, set the value of ESKIBANA_SERVER_HOST as "::"
ESKIBANA_SERVER_HOST="::"
- To use IPv4, set the value of ESKIBANA_SERVER_HOST as "0.0.0.0"
- If you are using a Kubernetes cluster, perform the following steps:
- Create PodSecurityPolicy (PSP) for EFK. You must have cluster-admin privileges to create a PSP.
- Open the efk-fluent-bit-psp.yaml file. Enter the namespace that you created.
The efk-fluent-bit-psp.yaml file is located at helix-on-prem-deployment-manager/bmc-helix-logging/efk/fluent-bit/efk-fluent-bit-psp.yaml.
You can also download it from . Run the following command to apply the changes:
kubectl apply -f efk-fluent-bit-psp.yamlRole and RoleBinding are created automatically.
- If you are using OpenShift cluster, perform the following steps:
- Create Security Context Constraints (SCC) for EFK. You must have cluster-admin privileges to create an SCC.
- Open the efk-fluent-bit-scc.yaml file. Enter the namespace that you created..
The efk-fluent-bit-scc.yaml file is located at helix-on-prem-deployment-manager/bmc-helix-logging/efk/fluent-bit/efk-fluent-bit-scc.yaml.
You can also download it from . Run the following command to apply your changes:
oc apply -f efk-fluent-bit-scc.yamlRun the following command to apply SCC on Fluent Bit service account:
oc adm policy add-scc-to-user efk-fluent-bit system:serviceaccounts:<namespace>:efk-fluent-bit- Create the Role and RoleBinding by using the :
- Open the efk-fluent-bit-role_rolebinding.yaml file. Enter the namespace that you created.
Run the following commands to apply your changes:
oc apply -f efk-fluent-bit-role_rolebinding.yaml
oc adm policy add-scc-to-user efk-fluent-bit system:serviceaccounts:<namespace>:efk-fluent-bit
- (Optional) View logs on the Kibana user interface.
- From the config/infra.config file, obtain the URL to access the Kibana UI.
For example: https://kibana.apexglobal.bmc.com - On the Kibana login screen:
- Enter elastic as the default user name.
- Enter the Kibana password that is added in the commons/certs/secrets.txt file.
- Click Log In .
- From the config/infra.config file, obtain the URL to access the Kibana UI.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*