mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
Adding Dedicated Admin content for Dedicated 4.1 doc set
This commit is contained in:
@@ -40,7 +40,7 @@ Name: Architecture
|
||||
Dir: architecture
|
||||
Distros: openshift-enterprise,openshift-origin,openshift-dedicated
|
||||
Topics:
|
||||
- Name: OpenShift Container Platform architecture
|
||||
- Name: Product architecture
|
||||
File: architecture
|
||||
Distros: openshift-enterprise,openshift-origin,openshift-dedicated
|
||||
- Name: Abstraction layers and topology
|
||||
@@ -57,6 +57,13 @@ Topics:
|
||||
File: customizations
|
||||
Distros: openshift-enterprise,openshift-origin
|
||||
---
|
||||
Name: Administering a cluster
|
||||
Dir: administering_a_cluster
|
||||
Distros: openshift-dedicated
|
||||
Topics:
|
||||
- Name: The Dedicated admin role
|
||||
File: dedicated-admin-role
|
||||
---
|
||||
Name: Web console
|
||||
Dir: web-console
|
||||
Distros: openshift-enterprise,openshift-origin,openshift-dedicated
|
||||
|
||||
33
administering_a_cluster/dedicated-admin-role.adoc
Normal file
33
administering_a_cluster/dedicated-admin-role.adoc
Normal file
@@ -0,0 +1,33 @@
|
||||
[id="dedicated-administrator-role"]
|
||||
= The {product-title} admin role
|
||||
include::modules/common-attributes.adoc[]
|
||||
:context: dedicated-administrator
|
||||
toc::[]
|
||||
|
||||
As an administrator of an {product-title} cluster, your account has additional
|
||||
permissions and access to all user-created projects in your organization's
|
||||
cluster. While logged in to an account with this role, the basic developer CLI
|
||||
(the `oc` command) allows you increased visibility and management capabilities
|
||||
over objects across projects, while the administrator CLI (commands under the
|
||||
`oc adm` command) allow you to complete additional operations.
|
||||
|
||||
[NOTE]
|
||||
====
|
||||
While your account does have these increased permissions, the actual cluster
|
||||
maintenance and host configuration is still performed by the OpenShift
|
||||
Operations Team. If you would like to request a change to your cluster that you
|
||||
cannot perform using the administrator CLI, open a support case on the
|
||||
link:https://access.redhat.com/support/[Red Hat Customer Portal].
|
||||
====
|
||||
|
||||
include::modules/dedicated-logging-in-and-verifying-permissions.adoc[leveloffset=+1]
|
||||
|
||||
include::modules/dedicated-managing-dedicated-administrators.adoc[leveloffset=+1]
|
||||
|
||||
include::modules/managing-dedicated-readers-group.adoc[leveloffset=+1]
|
||||
|
||||
include::modules/dedicated-admin-granting-permissions.adoc[leveloffset=+1]
|
||||
|
||||
include::modules/dedicated-managing-service-accounts.adoc[leveloffset=+1]
|
||||
|
||||
include::modules/dedicated-managing-quotas-and-limit-ranges.adoc[leveloffset=+1]
|
||||
14
modules/dedicated-admin-granting-permissions.adoc
Normal file
14
modules/dedicated-admin-granting-permissions.adoc
Normal file
@@ -0,0 +1,14 @@
|
||||
// Module included in the following assemblies:
|
||||
//
|
||||
// administering_a_cluster/dedicated-admin-role.adoc
|
||||
|
||||
[id="dedicated-admin-granting-permissions{context}"]
|
||||
= Granting permissions to users or groups
|
||||
|
||||
To grant permissions to other users or groups, you can add, or _bind_, a role to
|
||||
them using the following commands:
|
||||
|
||||
----
|
||||
$ oc adm policy add-role-to-user <role> <user_name>
|
||||
$ oc adm policy add-role-to-group <role> <group_name>
|
||||
----
|
||||
75
modules/dedicated-logging-in-and-verifying-permissions.adoc
Normal file
75
modules/dedicated-logging-in-and-verifying-permissions.adoc
Normal file
@@ -0,0 +1,75 @@
|
||||
// Module included in the following assemblies:
|
||||
//
|
||||
// administering_a_cluster/dedicated-admin-role.adoc
|
||||
|
||||
[id="dedicated-admin-logging-in-verifying-permissions{context}"]
|
||||
= Logging in and verifying permissions
|
||||
|
||||
You can log in as an {product-title} cluster administration via the web console
|
||||
or CLI, just as you would if you were an application developer.
|
||||
|
||||
When you log into the web console, all user-created projects across the cluster
|
||||
are visible from the main *Projects* page.
|
||||
|
||||
Use the standard `oc login` command to log in with the CLI:
|
||||
|
||||
----
|
||||
$ oc login <your_instance_url>
|
||||
----
|
||||
|
||||
All projects are visible using:
|
||||
|
||||
----
|
||||
$ oc get projects
|
||||
----
|
||||
|
||||
When your account has the `dedicated-cluster-admin` cluster role bound to it,
|
||||
you are automatically bound to the `dedicated-project-admin` for any new
|
||||
projects that are created by users in the cluster.
|
||||
|
||||
To verify if your account has administrator privileges, run the following
|
||||
command against a user-created project to view its default role bindings. If you
|
||||
are a cluster administrator, you will see your account listed under subjects for
|
||||
the *dedicated-project-admin* role binding for the project:
|
||||
|
||||
----
|
||||
$ oc describe rolebinding.rbac -n <project_name>
|
||||
|
||||
Name: admin
|
||||
Labels: <none>
|
||||
Annotations: <none>
|
||||
Role:
|
||||
Kind: ClusterRole
|
||||
Name: admin
|
||||
Subjects:
|
||||
Kind Name Namespace
|
||||
---- ---- ---------
|
||||
User fred@example.com <1>
|
||||
|
||||
|
||||
Name: dedicated-project-admin
|
||||
Labels: <none>
|
||||
Annotations: <none>
|
||||
Role:
|
||||
Kind: ClusterRole
|
||||
Name: dedicated-project-admin
|
||||
Subjects:
|
||||
Kind Name Namespace
|
||||
---- ---- ---------
|
||||
User alice@example.com <2>
|
||||
User bob@example.com <2>
|
||||
...
|
||||
----
|
||||
<1> The `fred@example.com`user is a normal, project-scoped administrator for
|
||||
this project.
|
||||
<2> The `alice@example.com` and `bob@example.com` users are cluster
|
||||
administrators.
|
||||
|
||||
To view details on your increased permissions, and the sets of
|
||||
verbs and resources associated with the `dedicated-cluster-admin` and
|
||||
`dedicated-project-admin` roles, run the following:
|
||||
|
||||
----
|
||||
$ oc describe clusterrole.rbac dedicated-cluster-admin
|
||||
$ oc describe clusterrole.rbac dedicated-project-admin
|
||||
----
|
||||
30
modules/dedicated-managing-dedicated-administrators.adoc
Normal file
30
modules/dedicated-managing-dedicated-administrators.adoc
Normal file
@@ -0,0 +1,30 @@
|
||||
// Module included in the following assemblies:
|
||||
//
|
||||
// administering_a_cluster/dedicated-admin-role.adoc
|
||||
|
||||
[id="dedicated-managing-administrators{context}"]
|
||||
= Managing {product-title} administrators
|
||||
|
||||
Administrator roles are managed using a `dedicated-admins` group on the cluster.
|
||||
Existing members of this group can edit membership. To view a list of current
|
||||
dedicated administrators by user name, you can use the following command:
|
||||
|
||||
----
|
||||
$ oc describe group dedicated-admins
|
||||
----
|
||||
|
||||
To add a new member to the `dedicated-admins` group:
|
||||
|
||||
----
|
||||
$ oc adm groups add-users dedicated-admins <user_name>
|
||||
----
|
||||
|
||||
To remove an existing user from the `dedicated-admins` group:
|
||||
|
||||
----
|
||||
$ oc adm groups remove-users dedicated-admins <user_name>
|
||||
----
|
||||
|
||||
If this group is currently empty or if you need assistance editing group
|
||||
membership, open a support case on the
|
||||
link:https://access.redhat.com/support/[Red Hat Customer Portal].
|
||||
14
modules/dedicated-managing-quotas-and-limit-ranges.adoc
Normal file
14
modules/dedicated-managing-quotas-and-limit-ranges.adoc
Normal file
@@ -0,0 +1,14 @@
|
||||
// Module included in the following assemblies:
|
||||
//
|
||||
// administering_a_cluster/dedicated-admin-role.adoc
|
||||
|
||||
[id="dedicated-managing-quotas-and-limit-ranges{context}"]
|
||||
= Managing quotas and limit ranges
|
||||
|
||||
As an administrator, you are able to view, create, and modify quotas limit
|
||||
ranges on other projects. This allows you to better constrain how compute
|
||||
resources and objects are consumed by users across the cluster.
|
||||
|
||||
Defaults can be set for quotas and limit ranges for new projects at creation. To
|
||||
request such a change, open a support case on the
|
||||
https://access.redhat.com/support/[Red Hat Customer Portal].
|
||||
45
modules/dedicated-managing-service-accounts.adoc
Normal file
45
modules/dedicated-managing-service-accounts.adoc
Normal file
@@ -0,0 +1,45 @@
|
||||
// Module included in the following assemblies:
|
||||
//
|
||||
// administering_a_cluster/dedicated-admin-role.adoc
|
||||
|
||||
[id="dedicated-managing-service-accounts{context}"]
|
||||
= Managing service accounts
|
||||
|
||||
Service accounts are API objects that exist within each project. To manage
|
||||
service accounts, you can use the `oc` command with the `sa` or `serviceaccount`
|
||||
object type or use the web console.
|
||||
|
||||
To get a list of existing service accounts in the current project, run:
|
||||
|
||||
----
|
||||
$ oc get sa
|
||||
NAME SECRETS AGE
|
||||
builder 2 2d
|
||||
default 2 2d
|
||||
deployer 2 2d
|
||||
----
|
||||
|
||||
To create a new service account, run:
|
||||
|
||||
----
|
||||
$ oc create sa <service-account-name>
|
||||
----
|
||||
|
||||
As soon as a service account is created, two secrets are automatically added to
|
||||
it:
|
||||
|
||||
* an API token
|
||||
* credentials for the OpenShift Container Registry
|
||||
|
||||
These can be seen by describing the service account:
|
||||
|
||||
----
|
||||
$ oc describe sa <service-account-name>
|
||||
----
|
||||
|
||||
The system ensures that service accounts always have an API token and registry
|
||||
credentials.
|
||||
|
||||
The generated API token and registry credentials do not expire, but they can be
|
||||
revoked by deleting the secret. When the secret is deleted, a new one is
|
||||
automatically generated to take its place.
|
||||
30
modules/managing-dedicated-readers-group.adoc
Normal file
30
modules/managing-dedicated-readers-group.adoc
Normal file
@@ -0,0 +1,30 @@
|
||||
// Module included in the following assemblies:
|
||||
//
|
||||
// administering_a_cluster/dedicated-admin-role.adoc
|
||||
|
||||
[id="dedicated-managing-dedicated-readers-group{context}"]
|
||||
= Managing the dedicated-readers group
|
||||
|
||||
Users with a `dedicated-reader` role are granted edit and view access to the
|
||||
`dedicated-reader` project and view-only access to the other projects.
|
||||
|
||||
To view a list of current dedicated readers by user name, you can use the
|
||||
following command:
|
||||
|
||||
----
|
||||
$ oc describe group dedicated-readers
|
||||
----
|
||||
|
||||
To add a new member to the `dedicated-readers` group, if you have
|
||||
`dedicated-admin` access:
|
||||
|
||||
----
|
||||
$ oc adm groups add-users dedicated-readers <user_name>
|
||||
----
|
||||
|
||||
To remove an existing user from the `dedicated-readers` group, if you have
|
||||
`dedicated-admin` access:
|
||||
|
||||
----
|
||||
$ oc adm groups remove-users dedicated-readers <user_name>
|
||||
----
|
||||
Reference in New Issue
Block a user