1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

OSDOCS-14980-416: manual CP

This commit is contained in:
“Shauna Diaz”
2025-09-22 08:19:24 -04:00
parent 4eacd7def1
commit 6712fbdf70
28 changed files with 129 additions and 132 deletions

View File

@@ -55,6 +55,10 @@ Distros: microshift
Topics:
- Name: Installing with an RPM package
File: microshift-install-rpm
- Name: Stopping and starting MicroShift
File: microshift-stop-start
- Name: Accessing the MicroShift node with oc
File: microshift-access-node
- Name: Uninstalling MicroShift
File: microshift-uninstall-rpm
---
@@ -97,16 +101,17 @@ Topics:
File: microshift-default-config-yaml
- Name: Customizing MicroShift by using the configuration file
File: microshift-using-config-yaml
- Name: Using configuration snippets
File: microshift-config-snippets
- Name: Cluster access with kubeconfig files
File: microshift-cluster-access-kubeconfig
- Name: Using custom certificate authorities
File: microshift-custom-ca
- Name: Node access with kubeconfig files
File: microshift-node-access-kubeconfig
- Name: Checking the status of greenboot health checks
File: microshift-greenboot-checking-status
- Name: Configuring audit logging policies
File: microshift-audit-logs-config
- Name: Configuring MicroShift authentication and security
Dir: microshift_auth_security
Topics:
- Name: Using custom certificate authorities
File: microshift-custom-ca
- Name: Configuring audit logging policies
File: microshift-audit-logs-config
---
Name: Networking
Dir: microshift_networking

View File

@@ -6,7 +6,7 @@ include::_attributes/attributes-microshift.adoc[]
toc::[]
You can use different command-line interface (CLI) tools to build, deploy, and manage a {microshift-short} cluster and workloads. With CLI tools, you can complete various administration and development operations from the terminal to manage deployments and interact with each component of the system.
You can use different command-line interface (CLI) tools to build, deploy, and manage a {microshift-short} node and workloads. With CLI tools, you can complete various administration and development operations from the terminal to manage deployments and interact with each component of the system.
CLI tools available for use with {microshift-short} are the following:
@@ -16,14 +16,14 @@ CLI tools available for use with {microshift-short} are the following:
[NOTE]
====
Commands for multi-node deployments, projects, and developer tooling are not supported by {product-title}.
Commands for multi-node deployments, projects, and developer tools are not supported by {microshift-short}.
====
[role="_additional-resources"]
[id="additional-resources_microshift-cli-tools"]
[role="_additional-resources"]
== Additional resources
* xref:..//microshift_cli_ref/microshift-oc-cli-install.adoc#microshift-oc-cli-install[Getting started with the OpenShift CLI]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.16/html/cli_tools/openshift-cli-oc#cli-about-cli_cli-developer-commands[About the OpenShift CLI] (OpenShift Container Platform documentation)
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9[Red Hat Enterprise Linux (RHEL) documentation for specific use cases]
* xref:../microshift_configuring/microshift-cluster-access-kubeconfig.adoc#microshift-kubeconfig[Cluster access with kubeconfig]
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9[Red Hat Enterprise Linux (RHEL) documentation for specific use cases]
* xref:../microshift_configuring/microshift-node-access-kubeconfig.adoc#microshift-kubeconfig[Node access with kubeconfig]

View File

@@ -1,15 +0,0 @@
:_mod-docs-content-type: ASSEMBLY
[id="microshift-config-snippets"]
include::_attributes/attributes-microshift.adoc[]
= Using {microshift-short} configuration snippets
:context: microshift-config-snippets
If you want to configure one or two settings, use the `/etc/microshift/config.d/` configuration directory to drop in configuration snippet YAML files.
include::modules/microshift-how-config-snippets-work.adoc[leveloffset=+1]
include::modules/microshift-example-config-snippets-list.adoc[leveloffset=+1]
include::modules/microshift-example-config-snippets-objects.adoc[leveloffset=+1]
include::modules/microshift-example-mixed-config-snippets.adoc[leveloffset=+1]

View File

@@ -16,8 +16,8 @@ include::modules/microshift-config-yaml.adoc[leveloffset=+1]
include::modules/microshift-default-settings.adoc[leveloffset=+2]
//[id="additional-resources_microshift-using-config-yaml_{context}"]
//[role="_additional-resources"]
//== Additional resources
[id="additional-resources_microshift-using-config-yaml_{context}"]
[role="_additional-resources"]
== Additional resources
//* xref:../microshift-using-config-yaml.adoc#microshift-using-config-yaml[Customizing {microshift-short} by using the configuration file]

View File

@@ -1,8 +1,8 @@
:_mod-docs-content-type: ASSEMBLY
[id="microshift-kubeconfig"]
= Cluster access with kubeconfig files
[id="microshift-node-access-kubeconfig"]
= Node access with kubeconfig files
include::_attributes/attributes-microshift.adoc[]
:context: microshift-kubeconfig
:context: microshift-node-access-kubeconfig
toc::[]
@@ -12,12 +12,12 @@ include::modules/microshift-kubeconfig-overview.adoc[leveloffset=+1]
include::modules/microshift-kubeconfig-local-access.adoc[leveloffset=+1]
include::modules/microshift-accessing-cluster-locally.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-locally.adoc[leveloffset=+2]
include::modules/microshift-kubeconfig-remote-con.adoc[leveloffset=+1]
include::modules/microshift-kubeconfig-generating-remote-kcfiles.adoc[leveloffset=+1]
include::modules/microshift-kubeconfig-generating-additional-files.adoc[leveloffset=+1]
include::modules/microshift-accessing-cluster-open-firewall.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-open-firewall.adoc[leveloffset=+2]
include::modules/microshift-accessing-cluster-remotely.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-remotely.adoc[leveloffset=+2]

View File

@@ -0,0 +1 @@
../../_attributes/

View File

@@ -0,0 +1 @@
../../images/

View File

@@ -19,11 +19,12 @@ include::modules/microshift-custom-ca-troubleshooting.adoc[leveloffset=+1]
include::modules/microshift-custom-ca-cert-cleaning.adoc[leveloffset=+1]
[id="Additional-resources_microshift-custom-ca_{context}"]
[role="_additional-resources"]
== Additional resources
* link:https://docs.openshift.com/container-platform/{ocp-version}/security/certificates/api-server.html#customize-certificates-api-add-named_api-server-certificates[OpenShift: Add an API server named certificate]
* link:https://docs.openshift.com/container-platform/{ocp-version}/security/certificates/api-server.html#customize-certificates-api-add-named_api-server-certificates[OpenShift: Add an API server named certificate] ({OCP} documentation)
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/securing_networks/creating-and-managing-tls-keys-and-certificates_securing-networks#doc-wrapper[RHEL: Creating and managing TLS keys and certificates]
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/securing_networks/creating-and-managing-tls-keys-and-certificates_securing-networks#doc-wrapper[RHEL: Creating and managing TLS keys and certificates] (RHEL documentation)
* link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/securing_networks/using-shared-system-certificates_securing-networks#the-system-wide-trust-store_using-shared-system-certificates[The system-wide truststore]
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/securing_networks/using-shared-system-certificates_securing-networks#the-system-wide-trust-store_using-shared-system-certificates[The system-wide truststore] (RHEL documentation)
* link:https://docs.openshift.com/container-platform/{ocp-version}/cli_reference/openshift_cli/managing-cli-profiles.html[OpenShift CLI Reference: oc login]
* link:https://docs.openshift.com/container-platform/{ocp-version}/cli_reference/openshift_cli/managing-cli-profiles.html[OpenShift CLI Reference: oc login]

View File

@@ -0,0 +1 @@
../../modules/

View File

@@ -0,0 +1 @@
../../snippets/

View File

@@ -0,0 +1,24 @@
:_mod-docs-content-type: ASSEMBLY
[id="microshift-access-node"]
include::_attributes/attributes-microshift.adoc[]
= Accessing the {microshift-short} node with oc
:context: microshift-access-node
toc::[]
Access a {microshift-short} node by using the {oc-first}.
include::modules/microshift-accessing.adoc[leveloffset=+1]
include::modules/microshift-accessing-node-locally.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-open-firewall.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-remotely.adoc[leveloffset=+2]
[id="additional-resources_microshift-access-node"]
[role="_additional-resources"]
== Additional resources
* xref:../microshift_cli_ref/microshift-oc-cli-install.adoc#microshift-oc-cli-install[Installing the OpenShift CLI tool]
* xref:../microshift_configuring/microshift-node-access-kubeconfig.adoc#microshift-node-access-kubeconfig[Node access with kubeconfig files]

View File

@@ -19,43 +19,16 @@ include::snippets/microshift-rhde-compatibility-table-snip.adoc[leveloffset=+1]
include::modules/microshift-install-rpm-before.adoc[leveloffset=+1]
//additional resources for install rpm before module
[role="_additional-resources"]
.Additional resources
* xref:../microshift_install_get_ready/microshift-fips.adoc#microshift-fips[Using FIPS mode with {microshift-short}]
include::modules/microshift-install-rpm-preparing.adoc[leveloffset=+1]
//additional resources for install rpm prep module
[role="_additional-resources"]
.Additional resources
* Download the link:https://console.redhat.com/openshift/install/pull-secret[pull secret] from the Red Hat Hybrid Cloud Console
//* xref:../microshift_configuring/microshift-using-config-yaml.adoc#microshift-using-config-yaml[Customizing {microshift-short} by using the configuration file]
* For more options on partition configuration, read link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html-single/performing_a_standard_rhel_9_installation/index#manual-partitioning_graphical-installation[Configuring Manual Partitioning]
* For more information about resizing your existing LVs to free up capacity in your VGs, read link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html-single/configuring_and_managing_logical_volumes/index#managing-lvm-volume-groups_configuring-and-managing-logical-volumes[Managing LVM Volume Groups].
* For more information about creating VGs and PVs, read link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/configuring_and_managing_logical_volumes/overview-of-logical-volume-management_configuring-and-managing-logical-volumes[Overview of logical volume management]
include::modules/microshift-install-rpms.adoc[leveloffset=+1]
[id="microshift-starting-and-stopping"]
== Starting and stopping {microshift-short}
After installing all of the RPM packages you need, learn to start and stop the {microshift-short} service.
include::modules/microshift-service-starting.adoc[leveloffset=+2]
include::modules/microshift-service-stopping.adoc[leveloffset=+2]
include::modules/microshift-accessing.adoc[leveloffset=+2]
//additional resources for accessing module
[id="additional-resources_microshift-install-rpm"]
[role="_additional-resources"]
.Additional resources
* xref:../microshift_cli_ref/microshift-oc-cli-install.adoc#microshift-oc-cli-install[Installing the OpenShift CLI tool]
include::modules/microshift-accessing-cluster-locally.adoc[leveloffset=+2]
include::modules/microshift-accessing-cluster-open-firewall.adoc[leveloffset=+2]
include::modules/microshift-accessing-cluster-remotely.adoc[leveloffset=+2]
== Additional resources
* xref:../microshift_install_get_ready/microshift-fips.adoc#microshift-fips[Using FIPS mode with {microshift-short}]
* Download the link:https://console.redhat.com/openshift/install/pull-secret[pull secret] from the Red Hat Hybrid Cloud Console
* xref:../microshift_configuring/microshift-using-config-yaml.adoc#microshift-using-config-yaml[Customizing {microshift-short} by using the configuration file]
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/interactively_installing_rhel_over_the_network/customizing-the-system-in-the-installer_rhel-installer#manual-partitioning_customizing-the-system-in-the-installer[Configuring manual partitioning]
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/configuring_and_managing_logical_volumes/overview-of-logical-volume-management_configuring-and-managing-logical-volumes[Overview of logical volume management]
* link:https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html-single/configuring_and_managing_logical_volumes/index#managing-lvm-volume-groups_configuring-and-managing-logical-volumes[Managing LVM Volume Groups]

View File

@@ -0,0 +1,13 @@
:_mod-docs-content-type: ASSEMBLY
[id="microshift-stop-start"]
include::_attributes/attributes-microshift.adoc[]
= Stopping and starting {microshift-short}
:context: microshift-stop-start
toc::[]
You can stop or start {microshift-short} for a variety of reasons, including a fresh installation, adding optional RPM packages, and troubleshooting.
include::modules/microshift-service-starting.adoc[leveloffset=+1]
include::modules/microshift-service-stopping.adoc[leveloffset=+1]

View File

@@ -8,4 +8,4 @@ toc::[]
Before you uninstall {microshift-short}, clean up all the {microshift-short} data and configuration by running the `microshift-cleanup-data` script.
include::modules/microshift-uninstall-microshift-rpms.adoc[leveloffset=+1]
include::modules/microshift-uninstall-microshift-rpms.adoc[leveloffset=+1]

View File

@@ -18,7 +18,7 @@ include::modules/microshift-adding-service-to-blueprint.adoc[leveloffset=+2]
include::modules/microshift-creating-ostree-iso.adoc[leveloffset=+2]
[id="additional-resources_microshift-embed-microshift-offline-deployments_{context}"]
[id="additional-resources_microshift-embed-microshift-offline-deployments"]
[role="_additional-resources"]
== Additional resources

View File

@@ -64,12 +64,8 @@ include::modules/microshift-provisioning-ostree.adoc[leveloffset=+1]
include::modules/microshift-accessing.adoc[leveloffset=+1]
include::modules/microshift-accessing-cluster-locally.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-locally.adoc[leveloffset=+2]
include::modules/microshift-accessing-cluster-open-firewall.adoc[leveloffset=+2]
include::modules/microshift-accessing-node-open-firewall.adoc[leveloffset=+2]
include::modules/microshift-accessing-cluster-remotely.adoc[leveloffset=+2]
[role="_additional-resources"]
.Additional resources
* xref:../microshift_configuring/microshift-cluster-access-kubeconfig.adoc#microshift-kubeconfig-generating-remote-kcfiles_microshift-cluster-access-kubeconfig[Generating additional kubeconfig files for remote access]
include::modules/microshift-accessing-node-remotely.adoc[leveloffset=+2]

View File

@@ -49,15 +49,15 @@ See the following list for details:
[id="microshift-4-16-custom-cert-auths_{context}"]
==== Customizable certificate authorities for the API server are supported
With this release, you can configure a custom server certificate that has been issued by an external certificate authority (CA). The default API server certificate is issued by an internal {microshift-short} cluster CA. You can now replace this certificate with one that is issued by a CA that clients trust. See xref:../microshift_configuring/microshift-custom-ca.adoc#microshift-custom-ca[Configuring custom certificate authorities].
With this release, you can configure a custom server certificate that has been issued by an external certificate authority (CA). The default API server certificate is issued by an internal {microshift-short} cluster CA. You can now replace this certificate with one that is issued by a CA that clients trust. See xref:../microshift_configuring/microshift_auth_security/microshift-custom-ca.adoc#microshift-custom-ca[Configuring custom certificate authorities].
[id="microshift-4-16-audit-logging-config_{context}"]
==== Configurable policies for log file rotation and retention
You can now configure audit logging policies to manage the retention policies for log files, ensuring that edge devices with limited storage capacities are not hampered by accumulated logging data. To configure audit log policies, use settings such as a maximum file size limit and maximum retained files to set a limit on log storage size. You can also choose an audit policy profile to specify the data collected. See xref:../microshift_configuring/microshift-audit-logs-config.adoc#microshift-audit-logs-config[Configuring audit logs].
You can now configure audit logging policies to manage the retention policies for log files, ensuring that edge devices with limited storage capacities are not hampered by accumulated logging data. To configure audit log policies, use settings such as a maximum file size limit and maximum retained files to set a limit on log storage size. You can also choose an audit policy profile to specify the data collected. See xref:../microshift_configuring/microshift_auth_security/microshift-audit-logs-config.adoc#microshift-audit-logs-config[Configuring audit logs].
[id="microshift-4-16-certificates-cleaning_{context}"]
==== Support for cleaning up certificates
With this release, you can clean up custom certificates. For more information, see xref:../microshift_configuring/microshift-custom-ca.adoc#microshift-custom-ca-certificates-cleaning_microshift-custom-ca[Cleaning up and recreating the custom certificates].
With this release, you can clean up custom certificates. For more information, see xref:../microshift_configuring/microshift_auth_security/microshift-custom-ca.adoc#microshift-custom-ca-certificates-cleaning_microshift-custom-ca[Cleaning up and recreating the custom certificates].
[id="microshift-4-16-networking_{context}"]
=== Networking

View File

@@ -1,12 +1,12 @@
:_mod-docs-content-type: ASSEMBLY
[id="authentication-with-microshift"]
= Pod security authentication and authorization
= Pod security authentication and authorization with SCC
include::_attributes/attributes-microshift.adoc[]
:context: authentication-microshift
== Understanding and managing pod security admission
Pod security admission is an implementation of the link:https://kubernetes.io/docs/concepts/security/pod-security-standards/[Kubernetes pod security standards]. Use pod security admission to restrict the behavior of pods.
Pod security admission is an implementation of the link:https://kubernetes.io/docs/concepts/security/pod-security-standards/[Kubernetes pod security standards]. Use security content constraints (SCC) for pod security admission to restrict pod behavior.
include::modules/microshift-security-context-constraints.adoc[leveloffset=+1]

View File

@@ -21,4 +21,4 @@ include::modules/microshift-certificate-lifetime.adoc[leveloffset=+1]
[role="_additional-resources"]
.Additional resources
* xref:../microshift_configuring/microshift-custom-ca.adoc#microshift-custom-ca[Configuring custom certificate authorities].
* xref:../microshift_configuring/microshift_auth_security/microshift-custom-ca.adoc#microshift-custom-ca[Configuring custom certificate authorities].

View File

@@ -2,13 +2,13 @@
//
// microshift_install_rpm/microshift-install-rpm.adoc
// microshift_install_rpm_ostree/microshift-embed-in-rpm-ostree.adoc
// microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// microshift_configuring/microshift-node-access-kubeconfig.adoc
:_mod-docs-content-type: PROCEDURE
[id="accessing-microshift-cluster-locally_{context}"]
= Accessing the {microshift-short} cluster locally
[id="accessing-microshift-node-locally_{context}"]
= Accessing the {microshift-short} node locally
Use the following procedure to access the {microshift-short} cluster locally by using a `kubeconfig` file.
Use the following procedure to access the {microshift-short} node locally by using a `kubeconfig` file.
.Prerequisites

View File

@@ -2,20 +2,19 @@
//
// microshift_install_rpm/microshift-install-rpm.adoc
// microshift_install_rpm_ostree/microshift-embed-in-rpm-ostree.adoc
// microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// microshift_configuring/microshift-node-access-kubeconfig.adoc
:_mod-docs-content-type: PROCEDURE
[id="microshift-accessing-cluster-open-firewall_{context}"]
= Opening the firewall for remote access to the {microshift-short} cluster
[id="microshift-accessing-node-open-firewall_{context}"]
= Opening the firewall for remote access to the {microshift-short} node
Use the following procedure to open the firewall so that a remote user can access the {microshift-short} cluster. This procedure must be completed before a workstation user can access the cluster remotely.
Use the following procedure to open the firewall so that a remote user can access the {microshift-short} service. You must complete this procedure before a workstation user can access the node remotely.
For this procedure, `user@microshift` is the user on the {microshift-short} host machine and is responsible for setting up that machine so that it can be accessed by a remote user on a separate workstation.
.Prerequisites
* You have installed the `oc` binary.
* You installed {oc-first}.
* Your account has cluster administration privileges.
.Procedure

View File

@@ -2,20 +2,21 @@
//
// microshift_install_rpm/microshift-install-rpm.adoc
// microshift_install_rpm_ostree/microshift-embed-in-rpm-ostree.adoc
// microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// microshift_configuring/microshift-access-node-kubeconfig.adoc
:_mod-docs-content-type: PROCEDURE
[id="accessing-microshift-cluster-remotely_{context}"]
= Accessing the {microshift-short} cluster remotely
[id="accessing-microshift-node-remotely_{context}"]
= Accessing the {microshift-short} node remotely
Use the following procedure to access the {microshift-short} cluster from a remote location by using a `kubeconfig` file.
Use the following procedure to access the {microshift-short} service from a remote location by using a `kubeconfig` file.
The `user@workstation` login is used to access the host machine remotely. The `<user>` value in the procedure is the name of the user that `user@workstation` logs in with to the {microshift-short} host.
.Prerequisites
* You installed the {oc-first}.
* You installed {oc-first}.
* The `user@microshift` has opened the firewall from the local host.
* You generated additional `kubeconfig` files.
.Procedure
@@ -33,17 +34,13 @@ The `user@workstation` login is used to access the host machine remotely. The `<
[user@workstation]$ MICROSHIFT_MACHINE=<name or IP address of {microshift-short} machine>
----
. As `user@workstation`, copy the generated `kubeconfig` file that contains the host name or IP address you want to connect to from the {op-system-base} machine running {microshift-short} to your local machine by running the following command:
. As `user@workstation`, copy the generated `kubeconfig` file that contains the hostname or IP address you want to connect to from the {op-system-base} machine running {microshift-short} to your local machine by running the following command:
+
[source,terminal]
----
[user@workstation]$ ssh <user>@$MICROSHIFT_MACHINE "sudo cat /var/lib/microshift/resources/kubeadmin/$MICROSHIFT_MACHINE/kubeconfig" > ~/.kube/config
[user@workstation]$ ssh <user>@$MICROSHIFT_MACHINE "sudo cat /var/lib/microshift/resources/kubeadmin/$MICROSHIFT_MACHINE/kubeconfig" > ~/.kube/config <1>
----
+
[NOTE]
====
To generate the `kubeconfig` files for this step, see link:https://docs.redhat.com/en/documentation/red_hat_build_of_microshift/4.16/html/configuring/microshift-kubeconfig#generating-additional-kubeconfig-files_microshift-kubeconfig[Generating additional kubeconfig files for remote access].
====
<1> Replace _<user>_ with your SSH login credentials.
. As `user@workstation`, update the permissions on your `~/.kube/config` file by running the following command:
+

View File

@@ -4,11 +4,11 @@
// microshift_install_rpm_ostree/microshift-embed-in-rpm-ostree.adoc
:_mod-docs-content-type: CONCEPT
[id="accessing-microshift-cluster_{context}"]
= How to access the {microshift-short} cluster
[id="accessing-microshift-node_{context}"]
= How to access the {microshift-short} node
Use the procedures in this section to access the {microshift-short} cluster by using the {oc-first}.
Access the {microshift-short} service by using the {oc-first}.
* You can access the cluster from either the same machine running the {microshift-short} service or from a remote location.
* You can use this access to observe and administrate workloads.
* When using the following steps, choose the `kubeconfig` file that contains the host name or IP address you want to connect to and place it in the relevant directory.
* You can access the node from either the same machine running the {microshift-short} service or from a remote location.
* You can use this access to observe and administer workloads.
* When using the following steps, choose the `kubeconfig` file that contains the hostname or IP address you want to connect to and place it in the relevant directory.

View File

@@ -1,9 +1,9 @@
// Module included in the following assemblies:
//
// * microshift/microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// * microshift/microshift_configuring/microshift-node-access-kubeconfig.adoc
:_mod-docs-content-type: PROCEDURE
[id="generating-additional-kubeconfig-files_{context}"]
[id="microshift-kubeconfig-generating-additional-files_{context}"]
= Generating additional kubeconfig files for remote access
You can generate additional `kubeconfig` files to use if you need more host names or IP addresses than the default remote access file provides.

View File

@@ -1,12 +1,12 @@
// Module included in the following assemblies:
//
// * microshift/microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// * microshift/microshift_configuring/microshift-node-access-kubeconfig.adoc
:_mod-docs-content-type: CONCEPT
[id="microshift-kubeconfig-local-access_{context}"]
= Local access kubeconfig file
The local access `kubeconfig` file is written to `/var/lib/microshift/resources/kubeadmin/kubeconfig`. This `kubeconfig` file provides access to the API server using `localhost`. Choose this file when you are connecting the cluster locally.
The local access `kubeconfig` file is written to `/var/lib/microshift/resources/kubeadmin/kubeconfig`. This `kubeconfig` file provides access to the API server by using `localhost`. Choose this file when you are connecting the cluster locally.
.Example contents of `kubeconfig` for local access
[source,yaml]

View File

@@ -1,12 +1,12 @@
// Module included in the following assemblies:
//
// * microshift/microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// * microshift/microshift_configuring/microshift-node-access-kubeconfig.adoc
:_mod-docs-content-type: CONCEPT
[id="kubeconfig-files-overview_{context}"]
= Kubeconfig files for configuring cluster access
The two categories of `kubeconfig` files used in {microshift-short} are local access and remote access. Every time {microshift-short} starts, a set of `kubeconfig` files for local and remote access to the API server are generated. These files are generated in the `/var/lib/microshift/resources/kubeadmin/` directory using preexisting configuration information.
The two categories of `kubeconfig` files used in {microshift-short} are local access and remote access. Every time {microshift-short} starts, a set of `kubeconfig` files for local and remote access to the API server are generated. These files are generated in the `/var/lib/microshift/resources/kubeadmin/` directory by using preexisting configuration information.
Each access type requires a different authentication certificate signed by different Certificate Authorities (CAs). The generation of multiple `kubeconfig` files accommodates this need.
@@ -14,7 +14,7 @@ You can use the appropriate `kubeconfig` file for the access type needed in each
[NOTE]
====
A `kubeconfig` file must exist for the cluster to be accessible. The values are applied from built-in default values or a `config.yaml`, if one was created.
A `kubeconfig` file must exist for the cluster to be accessible. The values are applied from built-in default values or a customized `config.yaml` file.
====
.Example contents of the kubeconfig files
@@ -29,7 +29,7 @@ A `kubeconfig` file must exist for the cluster to be accessible. The values are
└── microshift-rhel9 <4>
└── kubeconfig
----
<1> Local host name. The main IP address of the host is always the default.
<1> Local hostname. The main IP address of the host is always the default.
<2> Subject Alternative Names for API server certificates.
<3> DNS name.
<4> {microshift-short} host name.
<4> {microshift-short} hostname.

View File

@@ -1,12 +1,12 @@
// Module included in the following assemblies:
//
// * microshift/microshift_configuring/microshift-cluster-access-kubeconfig.adoc
// * microshift/microshift_configuring/microshift-node-access-kubeconfig.adoc
:_mod-docs-content-type: CONCEPT
[id="remote-access-con_{context}"]
= Remote access kubeconfig files
When a {microshift-short} cluster connects to the API server from an external source, a certificate with all of the alternative names in the SAN field is used for validation. {microshift-short} generates a default `kubeconfig` for external access using the `hostname` value. The defaults are set in the `<node.hostnameOverride>`, `<node.nodeIP>` and `api.<dns.baseDomain>` parameter values of the default `kubeconfig` file.
When a {microshift-short} node connects to the API server from an external source, a certificate with all of the alternative names in the SAN field is used for validation. {microshift-short} generates a default `kubeconfig` for external access by using the `hostname` value. The defaults are set in the `<node.hostnameOverride>`, `<node.nodeIP>` and `api.<dns.baseDomain>` parameter values of the default `kubeconfig` file.
The `/var/lib/microshift/resources/kubeadmin/<hostname>/kubeconfig` file uses the `hostname` of the machine, or `node.hostnameOverride` if that option is set, to reach the API server. The CA of the `kubeconfig` file is able to validate certificates when accessed externally.
@@ -22,4 +22,4 @@ clusters:
//line space was not showing on PV1 preview, so added extra blank line
[id="remote-access-customization_{context}"]
== Remote access customization
Multiple remote access `kubeconfig` file values can be generated for accessing the cluster with different IP addresses or host names. An additional `kubeconfig` file generates for each entry in the `apiServer.subjectAltNames` parameter. You can copy remote access `kubeconfig` files from the host during times of IP connectivity and then use them to access the API server from other workstations.
Multiple remote access `kubeconfig` file values can be generated for accessing the node with different IP addresses or host names. An additional `kubeconfig` file generates for each entry in the `apiServer.subjectAltNames` parameter. You can copy remote access `kubeconfig` files from the host during times of IP connectivity and then use them to access the API server from other workstations.