1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-07 00:48:01 +01:00
Files
openshift-docs/modules/insights-operator-enable-obfuscation.adoc
2023-10-30 10:13:25 -04:00

50 lines
2.3 KiB
Plaintext

// Module included in the following assemblies:
//
// * support/remote_health_monitoring/remote-health-reporting-from-restricted-network.adoc
:_mod-docs-content-type: PROCEDURE
[id="insights-operator-enable-obfuscation_{context}"]
= Enabling Insights Operator data obfuscation
You can enable obfuscation to mask sensitive and identifiable IPv4 addresses and cluster base domains that the Insights Operator sends to link:https://console.redhat.com[console.redhat.com].
[WARNING]
====
Although this feature is available, Red Hat recommends keeping obfuscation disabled for a more effective support experience.
====
Obfuscation assigns non-identifying values to cluster IPv4 addresses, and uses a translation table that is retained in memory to change IP addresses to their obfuscated versions throughout the Insights Operator archive before uploading the data to link:https://console.redhat.com[console.redhat.com].
For cluster base domains, obfuscation changes the base domain to a hardcoded substring. For example, `cluster-api.openshift.example.com` becomes `cluster-api.<CLUSTER_BASE_DOMAIN>`.
The following procedure enables obfuscation using the `support` secret in the `openshift-config` namespace.
.Prerequisites
* You are logged in to the {product-title} web console as `cluster-admin`.
.Procedure
. Navigate to *Workloads* -> *Secrets*.
. Select the *openshift-config* project.
. Search for the *support* secret using the *Search by name* field. If it does not exist, click *Create* -> *Key/value secret* to create it.
. Click the *Options* menu {kebab}, and then click *Edit Secret*.
. Click *Add Key/Value*.
. Create a key named `enableGlobalObfuscation` with a value of `true`, and click *Save*.
. Navigate to *Workloads* -> *Pods*
. Select the `openshift-insights` project.
. Find the `insights-operator` pod.
. To restart the `insights-operator` pod, click the *Options* menu {kebab}, and then click *Delete Pod*.
.Verification
. Navigate to *Workloads* -> *Secrets*.
. Select the *openshift-insights* project.
. Search for the *obfuscation-translation-table* secret using the *Search by name* field.
If the `obfuscation-translation-table` secret exists, then obfuscation is enabled and working.
Alternatively, you can inspect `/insights-operator/gathers.json` in your Insights Operator archive for the value `"is_global_obfuscation_enabled": true`.