You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This guide demonstrates how to modify the Console, Downloads, OAuth domain, and TLS certificate keypair on Red Hat Openshift on AWS (ROSA) and Red Hat Openshift Dedicated (OSD) versions 4.14 and above. {fn-supported-versions}
27
27
28
+
////
28
29
The changes that we make to the component routes {fn-term-component-routes} in this guide are described in greater detail in the following documentation:
29
30
30
31
* link:https://docs.openshift.com/container-platform/latest/authentication/configuring-internal-oauth.html#customizing-the-oauth-server-url_configuring-internal-oauth[Customizing the internal OAuth server URL]
31
32
* link:https://docs.openshift.com/container-platform/latest/web_console/customizing-the-web-console.html#customizing-the-console-route_customizing-web-console[Customizing the console route]
32
33
* link:https://docs.openshift.com/container-platform/latest/web_console/customizing-the-web-console.html#customizing-the-download-route_customizing-web-console[Customizing the download route]
34
+
////
33
35
36
+
[id="prerequisites_{context}"]
34
37
== Prerequisites
35
38
36
39
* ROSA CLI (`rosa`) version 1.2.27 or higher {fn-supported-cli}
@@ -40,6 +43,7 @@ The changes that we make to the component routes {fn-term-component-routes} in t
40
43
* OpenSSL (for generating the demonstration SSL certificate), which can be downloaded and installed from link:https://www.openssl.org/source/[OpenSSL.org]
41
44
* Access to the cluster as a user with the `cluster-admin` role.
42
45
46
+
[id="find-current-routes_{context}"]
43
47
== Find the current routes
44
48
45
49
Before we make any configuration changes, we need to know the current routes in the cluster.
@@ -104,7 +108,8 @@ If we choose a new base domain of `my-new-domain.dev`, our new component routes
104
108
* `downloads-openshift-console.my-new-domain.dev` for Downloads
105
109
* `oauth-openshift.my-new-domain.dev` for OAuth
106
110
107
-
== Creating a valid TLS certificate for each component route
== Create a valid TLS certificate for each component route
108
113
109
114
In this section, we create a self-signed certificate key pair and then trust it to verify that we can access our new component routes using a real web browser. This is for demonstration purposes only, and is not recommended as a solution for production workloads. Consult your certificate authority to understand how to create a certificate with similar attributes for your production workloads.
== Find the hostname of the load balancer in your cluster
153
160
154
161
When you create a cluster, ROSA and OSD create a load balancer and generate a hostname for that load balancer. We need to know the load balancer hostname in order to create DNS records for our cluster.
@@ -166,13 +173,15 @@ In our case, the hostname is `a234gsr3242rsfsfs-1342r624.us-east-1.elb.amazonaws
166
173
167
174
Save this value for later, as we will need it to configure DNS records for our new component route hostnames.
168
175
176
+
[id="add-routes-to-dns_{context}"]
169
177
== Add component route DNS records to your hosting provider
170
178
171
179
In your hosting provider, add DNS records that map the `CNAME` of your new component route hostnames to the load balancer hostname we found in the previous step.
172
180
173
181
//.Need an image for this
174
182
//image::[Picture goes here]
175
183
184
+
[id="update-routes-tls-using-rosa-cli_{context}"]
176
185
== Update the component routes and TLS secret using the ROSA CLI
177
186
178
187
When your DNS records have been updated, you can use the ROSA CLI to change the component routes.
0 commit comments