You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug:
If I have a logging-instance running with multiple fluentd workers it is not forbidden to use the detectExceptions filter, while this will break the fluentd processes.
Expected behaviour:
As this is a known limitation, it would be nice to mark the Flow as "not valid".
Steps to reproduce the bug:
Create a logging-instance with multiple workers and create a Flow with detectExceptions filter.
Environment details:
Kubernetes version (e.g. v1.15.2): 1.25
Cloud-provider/provisioner (e.g. AKS, GKE, EKS, PKE etc): AKS
logging-operator version (e.g. 2.1.1): 4.2.2
Install method (e.g. helm or static manifests): Helm
Logs from the misbehaving component (and any other relevant logs):
Resource definition (possibly in YAML format) that caused the issue, without sensitive data:
The request is valid, although this is not a bug, but an enhancement request. It adds a validation on top of fluentd that doesn't tell us about the problem exactly.
Describe the bug:
If I have a logging-instance running with multiple fluentd workers it is not forbidden to use the detectExceptions filter, while this will break the fluentd processes.
Expected behaviour:
As this is a known limitation, it would be nice to mark the Flow as "not valid".
Steps to reproduce the bug:
Create a logging-instance with multiple workers and create a Flow with detectExceptions filter.
Environment details:
/kind bug
The text was updated successfully, but these errors were encountered: