1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00
Files
openshift-docs/modules/network-observability-loki-secret.adoc

39 lines
1.7 KiB
Plaintext

// Module included in the following assemblies:
// * networking/network_observability/installing-operators.adoc
:_mod-docs-content-type: PROCEDURE
[id="network-observability-loki-secret_{context}"]
= Creating a secret for Loki storage
[role="_abstract"]
Create a secret with cloud storage credentials, such as for {aws-first}, to allow the Loki Operator to access the necessary object store for log persistence.
The {loki-op} supports a few log storage options, such as AWS S3, {gcp-full} Storage, Azure, Swift, Minio, {rh-storage}. The following example shows how to create a secret for AWS S3 storage. The secret created in this example, `loki-s3`, is referenced in "Creating a LokiStack custom resource". You can create this secret in the web console or CLI.
.Procedure
. Using the web console, navigate to the *Project* -> *All Projects* dropdown and select *Create Project*.
. Name the project `netobserv` and click *Create*.
. Navigate to the Import icon, *+*, in the top right corner. Paste your YAML file into the editor.
+
The following shows an example secret YAML file for S3 storage:
+
[source,yaml]
----
apiVersion: v1
kind: Secret
metadata:
name: loki-s3
namespace: netobserv <1>
stringData:
access_key_id: QUtJQUlPU0ZPRE5ON0VYQU1QTEUK
access_key_secret: d0phbHJYVXRuRkVNSS9LN01ERU5HL2JQeFJmaUNZRVhBTVBMRUtFWQo=
bucketnames: s3-bucket-name
endpoint: https://s3.eu-central-1.amazonaws.com
region: eu-central-1
----
<1> The installation examples in this documentation use the same namespace, `netobserv`, across all components. You can optionally use a different namespace for the different components
.Verification
* After you create the secret, you view the secret listed under *Workloads* -> *Secrets* in the web console.