You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -19,124 +19,67 @@ The Redis Enterprise log collector script helps gather diagnostic information fo
19
19
-**Restricted mode**: Collects only Redis Enterprise-related resources and logs (default for versions 6.2.18-3+)
20
20
-**All mode**: Collects comprehensive cluster information including non-Redis resources (default for versions 6.2.12-1 and earlier)
21
21
22
-
## When to use each mode
22
+
## Collection modes
23
23
24
-
### Restricted mode (recommended)
24
+
-**Restricted mode** (recommended): Collects only Redis Enterprise resources with minimal security exposure. Default for versions 6.2.18-3+.
25
+
-**All mode**: Collects comprehensive cluster information including nodes, storage classes, and operator resources. Use when specifically requested by Redis Support.
25
26
26
-
Use restricted mode when:
27
-
- You want to minimize security exposure
28
-
- Your organization has strict RBAC policies
29
-
- You only need Redis Enterprise-specific troubleshooting data
30
-
- You're running version 6.2.18-3 or later (default mode)
27
+
## RBAC configurations
31
28
32
-
### All mode
29
+
### Restricted mode
33
30
34
-
Use all mode when:
35
-
- You need comprehensive cluster diagnostics
36
-
- Redis Support specifically requests additional cluster information
37
-
- You're troubleshooting complex issues that may involve non-Redis resources
38
-
- You're running version 6.2.12-1 or earlier (default mode)
Each YAML file contains both Role and ClusterRole objects. Running `kubectl apply` installs both components. You can safely run the command multiple times with different namespaces.
69
+
{{< /note >}}
85
70
86
-
### All mode additional permissions
87
-
88
-
In addition to all restricted mode permissions, all mode provides:
89
-
90
-
**Additional ClusterRole permissions:**
91
-
-**Nodes**: Read cluster node information and status
92
-
-**Storage classes**: Read storage class configurations
93
-
-**Volume attachments**: Read volume attachment status
94
-
-**Certificate signing requests**: Read certificate management information
The RBAC configurations request read access to secrets in the collected namespaces. **Secrets are not collected or included in the log package sent to Redis Support.** This permission is required because:
158
101
159
-
Both modes collect:
160
-
-**Secrets metadata**: Names and types of secrets (not the actual secret values)
161
-
-**ConfigMap data**: Configuration information that may contain sensitive settings
162
-
-**Pod logs**: Application logs that may contain sensitive information
102
+
- The log collector uses Helm commands (`helm list`, `helm get all`) to gather information about Redis Enterprise Helm chart deployments
103
+
- Helm stores its deployment metadata in Kubernetes secrets
104
+
- For Redis Enterprise charts, this metadata contains only deployment configuration (not sensitive data), but follows Helm's standard storage pattern
163
105
164
-
Ensure collected logs are handled according to your organization's data security policies.
106
+
If your security policies prohibit secrets access, you can remove the secrets permission from the Role, but this will limit the log collector's ability to gather Helm deployment information.
165
107
166
108
## Troubleshooting
167
109
168
-
### Permission denied errors
169
-
170
-
If you encounter permission errors:
171
-
172
-
1.**Verify RBAC resources**: Ensure roles and bindings are applied correctly
173
-
2.**Check service account**: Confirm the service account has the necessary bindings
174
-
3.**Validate namespace access**: Ensure role bindings exist in target namespaces
175
-
4.**Review mode requirements**: Verify you're using the correct mode for your needs
176
-
177
-
### Missing resources
178
-
179
-
If the log collector reports missing resources:
180
-
181
-
1.**Check cluster role permissions**: Ensure ClusterRole is applied and bound
If you encounter permission errors, verify that roles and bindings are applied correctly in the target namespaces. For missing resources, ensure the ClusterRole is applied and consider switching to all mode if additional resources are needed.
0 commit comments