Articles List

Openshift and the Organization

Organizational Maturity Models when Adopting a PaaS platform Assignment of Actions to Existing Roles Building toward a DevOps Organization Responsibilities for IT Organizations Using OpenShift Roles for IT Organizations Using OpenShift Mapping Roles to Responsibilities: RACI RACI Definitions How Teams Work Together in a DevOps Organization Conclusion Organizational Maturity Models when Adopting a PaaS platform While Platform-as-a-Service technologies alone are not capable of changing the way individuals and teams interact within an organization, they often serves as a catalyst for organizational change to support IT agility.

Using OpenShift Templates in a Configuration as Code Model

The DevOps movement has shown us the potential organizational impact of adopting practices like Everything as Code, treating infrastructure and application configurations as source code that gets continuously applied to environments via automation. This article discusses a way to adopt this model using OpenShift Templates. Overview OpenShift Template Discovery Kickin' it off with some oc new-app Template files, processing, applying Building Custom Templates Template Structure Methods for Writing or Generating Templates Parameter Substitution Best Practices & Tips for Template Writing Templates & Everything as Code (EaC) principles Use oc apply for repeatable process Source Control for Templates Automation using templates & the OpenShift Applier framework Go Forth and Template!

Openshift LDAP Integration

The OpenShift Container Platform provides support for leveraging users and groups stored in an Lightweight Directory Access Protocol (LDAP) V3 server using simple bind authentication. LDAP Users and their Access to OpenShift Example LDAP Tree Structure Configure OpenShift to use LDAP for User Authentication The LDAP Identity Provider OpenShift Ansible Configuration Manual Configuration Testing LDAP queries ldapsearch What''s Next? Resources The official OpenShift documentation provides a high level overview for authenticating a user against an LDAP server:

An Openshift Operators Guide

This is a brief overview aimed at system administrators in getting accustomed to what OpenShift actually looks like installed on a host, and a common places to look when things go wrong. What should be running (systemctl) Nodes Masters Viewing Logs Storage Management What’s Next? What should be running (systemctl) At a high level, a host in an OpenShift cluster could include the following components:

Validating an OpenShift Install

After having gone through the process of building an OpenShift environment, it’s important to go through a few validation steps to ensure that all components are in proper working order. This document walks you through those steps. Validate Nodes Validate Status of Default Project Check that Registry Is Running Check that Router is Running Run Diagnostics Create an Application But wait, something didn’t work! Other Resources Validate Nodes # oc get nodes Check the output to ensure that:

Openshift Pre-Install Validation Checklist

This document is designed to ensure your OpenShift cluster nodes are ready for the installation of OpenShift via the advanced ansible installer Ensure ssh keys are propagated for ansible installer DNS lookup on each node in your cluster DNS reverse lookup on each node OCP 3.3 install repos OCP 3.4 install repos Show the repos expected and enabled Are updates required before you install OpenShift Is subscription manager active To list all repos recognized by your rhel 7 nodes Ensure docker is enabled Ensure NetworkManager is enabled Check the sha256sum of a docker 1.

Load Balancing Integration for OpenShift

This guide will walk you through how to leverage Load Balancers for cluster and application high availability. Load Balancing For HA Applications Simple Integration (External LB as a Passthrough) Hybrid Integration (External LB Termination) Full Integration (Integrating F5 as the OpenShift Router) Load Balancing For HA Master Infrastructure Simple SSL Passthrough (Non-Prod only) Custom Certificate SSL Termination (Production) Guides for Specific Load Balancer Implementations 1.

External Jenkins Integration

The OpenShift Container Platform provides a number of features to support Continuous Integration and Continuous Delivery. Aside from its native build and deployment capabilities. Requirements Networking Plugins Credentials Service Account Creation within OpenShift Jenkins Credentials Creation OpenShift Sync Plugin Dynamic Slaves JNLP Port Kubernetes Plugin Configuration Validating the Configuration BuildConfig Synchronization Dynamic Slave Execution OpenShift contains tight integration with the Jenkins Continuous Integration server.

Openshift Monitoring Guide

OpenShift Monitoring is an ever evolving problem space, with many layers, approaches, and complexities. We attempt to unpack them here. Overview Ensuring a cluster is healthy Docker Nodes & Masters API Endpoints Ensuring a cluster has adequate capacity What’s Next? Overview Note Before reading this guide, we recommend first reading An Overview of OpenShift for System Admins. The following document intends to provide starting guidance on how to build a monitoring approach for OpenShift.

LDAP Group Synchronization with OpenShift

This guide discusses the synchronization of groups defined in an LDAP server with OpenShift and is distinct from using an LDAP server to authenticate users to OpenShift. Please refer to the LDAP Integration guide for using an LDAP server as an identity provider to govern user authentication to OpenShift. Client configuration file Connectivity Schema Group and User Queries Attribute Mapping Additional Configuration Options Explicit Group Mapping Executing the Synchronization job Whitelists/Blacklists Verifying Groups in OpenShift Associating Permissions to Synchronized Groups Pruning Groups References The OpenShift Container Platform contains a fully functional Role Based Access Control (RBAC) system.

1 of 2 Next Page