OpenShift Monitoring is an ever evolving problem space, with many layers, approaches, and complexities. We attempt to unpack them here. Overview Ensuring a cluster is healthy Docker Nodes & Masters API Endpoints Ensuring a cluster has adequate capacity What’s Next? Overview Note Before reading this guide, we recommend first reading An Overview of OpenShift for System Admins. The following document intends to provide starting guidance on how to build a monitoring approach for OpenShift.
This guide discusses the synchronization of groups defined in an LDAP server with OpenShift and is distinct from using an LDAP server to authenticate users to OpenShift. Please refer to the LDAP Integration guide for using an LDAP server as an identity provider to govern user authentication to OpenShift. Client configuration file Connectivity Schema Group and User Queries Attribute Mapping Additional Configuration Options Explicit Group Mapping Executing the Synchronization job Whitelists/Blacklists Verifying Groups in OpenShift Associating Permissions to Synchronized Groups Pruning Groups References The OpenShift Container Platform contains a fully functional Role Based Access Control (RBAC) system.
This is a followup to Installing a Highly Available OpenShift Cluster. Many assumptions are made based on the information in that guide. If you have not yet been through this guide, we recommend doing so before continuing. Overview How OpenShift Utilizes Certificates for Internal Communication Designing a Certificate Approach for OpenShift Configuring OpenShift to use Component-specific Custom Certificates Master API Certificate Default (Wildcard) Router Certificate Registry Certificate Other components Run Ansible Additional Resources What’s Next?