You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/customizing-the-web-console-URL.adoc
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,12 +10,12 @@ For `console` and `downloads` routes, custom routes functionality uses the `ingr
10
10
[id="customizing-the-console-route_{context}"]
11
11
== Customizing the console route
12
12
13
-
You can customize the console route by setting the custom host name and TLS certificate in the `spec.componentRoutes` field of the cluster `Ingress` configuration.
13
+
You can customize the console route by setting the custom hostname and TLS certificate in the `spec.componentRoutes` field of the cluster `Ingress` configuration.
14
14
15
15
.Prerequisites
16
16
17
17
* You have logged in to the cluster as a user with administrative privileges.
18
-
* You have created a secret in the `openshift-config` namespace containing the TLS certificate and key. This is required if the domain for the custom host name suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
18
+
* You have created a secret in the `openshift-config` namespace containing the TLS certificate and key. This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
19
19
+
20
20
[TIP]
21
21
====
@@ -31,7 +31,7 @@ You can create a TLS secret by using the `oc create secret tls` command.
31
31
$ oc edit ingress.config.openshift.io cluster
32
32
----
33
33
34
-
. Set the custom host name and optionally the serving certificate and key:
34
+
. Set the custom hostname and optionally the serving certificate and key:
35
35
+
36
36
[source,yaml]
37
37
----
@@ -47,20 +47,20 @@ spec:
47
47
servingCertKeyPairSecret:
48
48
name: <secret_name> <2>
49
49
----
50
-
<1> The custom host name.
51
-
<2> Reference to a secret in the `openshift-config` namespace that contains a TLS certificate (`tls.crt`) and key (`tls.key`). This is required if the domain for the custom host name suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
50
+
<1> The custom hostname.
51
+
<2> Reference to a secret in the `openshift-config` namespace that contains a TLS certificate (`tls.crt`) and key (`tls.key`). This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
52
52
53
53
. Save the file to apply the changes.
54
54
55
55
[id="customizing-the-download-route_{context}"]
56
56
== Customizing the download route
57
57
58
-
You can customize the download route by setting the custom host name and TLS certificate in the `spec.componentRoutes` field of the cluster `Ingress` configuration.
58
+
You can customize the download route by setting the custom hostname and TLS certificate in the `spec.componentRoutes` field of the cluster `Ingress` configuration.
59
59
60
60
.Prerequisites
61
61
62
62
* You have logged in to the cluster as a user with administrative privileges.
63
-
* You have created a secret in the `openshift-config` namespace containing the TLS certificate and key. This is required if the domain for the custom host name suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
63
+
* You have created a secret in the `openshift-config` namespace containing the TLS certificate and key. This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
64
64
+
65
65
[TIP]
66
66
====
@@ -76,7 +76,7 @@ You can create a TLS secret by using the `oc create secret tls` command.
76
76
$ oc edit ingress.config.openshift.io cluster
77
77
----
78
78
79
-
. Set the custom host name and optionally the serving certificate and key:
79
+
. Set the custom hostname and optionally the serving certificate and key:
80
80
+
81
81
[source,yaml]
82
82
----
@@ -92,7 +92,7 @@ spec:
92
92
servingCertKeyPairSecret:
93
93
name: <secret_name> <2>
94
94
----
95
-
<1> The custom host name.
96
-
<2> Reference to a secret in the `openshift-config` namespace that contains a TLS certificate (`tls.crt`) and key (`tls.key`). This is required if the domain for the custom host name suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
95
+
<1> The custom hostname.
96
+
<2> Reference to a secret in the `openshift-config` namespace that contains a TLS certificate (`tls.crt`) and key (`tls.key`). This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
You can customize the internal OAuth server URL by setting the custom hostname and TLS certificate in the `spec.componentRoutes` field of the cluster `Ingress` configuration.
9
+
10
+
[WARNING]
11
+
====
12
+
If you update the internal OAuth server URL, you might break trust from components in the cluster that need to communicate with the OpenShift OAuth server to retrieve OAuth access tokens. Components that need to trust the OAuth server will need to include the proper CA bundle when calling OAuth endpoints. For example:
The Cluster Authentication Operator publishes the OAuth server's serving certificate in the `oauth-serving-cert` config map in the `openshift-config-managed` namespace. You can find the certificate in the `data.ca-bundle.crt` key of the config map.
20
+
====
21
+
22
+
.Prerequisites
23
+
24
+
* You have logged in to the cluster as a user with administrative privileges.
25
+
* You have created a secret in the `openshift-config` namespace containing the TLS certificate and key. This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
26
+
+
27
+
[TIP]
28
+
====
29
+
You can create a TLS secret by using the `oc create secret tls` command.
30
+
====
31
+
32
+
.Procedure
33
+
34
+
. Edit the cluster `Ingress` configuration:
35
+
+
36
+
[source,terminal]
37
+
----
38
+
$ oc edit ingress.config.openshift.io cluster
39
+
----
40
+
41
+
. Set the custom hostname and optionally the serving certificate and key:
42
+
+
43
+
[source,yaml]
44
+
----
45
+
apiVersion: config.openshift.io/v1
46
+
kind: Ingress
47
+
metadata:
48
+
name: cluster
49
+
spec:
50
+
componentRoutes:
51
+
- name: oauth-openshift
52
+
namespace: openshift-authentication
53
+
hostname: <custom_hostname> <1>
54
+
servingCertKeyPairSecret:
55
+
name: <secret_name> <2>
56
+
----
57
+
<1> The custom hostname.
58
+
<2> Reference to a secret in the `openshift-config` namespace that contains a TLS certificate (`tls.crt`) and key (`tls.key`). This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.
0 commit comments