Skip to content

Commit b6ec2dd

Browse files
authored
Merge pull request #17565 from bmcelvee/osdocs-715
OSDOCS-715 pull secret doc improvements
2 parents b09c18b + 670eb8c commit b6ec2dd

9 files changed

+83
-16
lines changed

installing/install_config/customizations.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,7 @@ xref:../../installing/installing_aws/installing-aws-network-customizations.adoc#
157157

158158
|===
159159

160+
include::modules/images-update-global-pull-secret.adoc[leveloffset=+1]
160161

161162
////
162163
[id="default-crds_{context}"]

modules/builds-creating-secrets.adoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
// Module included in the following assemblies:
22
// * builds/creating-build-inputs.adoc
33

4-
54
[id="builds-creating-secrets_{context}"]
65
= Creating secrets
76

modules/images-allow-pods-to-reference-images-from-secure-registries.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
// Module included in the following assemblies:
22
// * openshift_images/using-image-pull-secrets
33
// * virt/virtual_machines/importing_vms/virt-importing-vmware-vm.adoc
4+
// * openshift_images/managing-image-streams.adoc
45

56
[id="images-allow-pods-to-reference-images-from-secure-registries_{context}"]
67
= Allowing pods to reference images from other secured registries
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
// Module included in the following assemblies:
2+
// * assembly/openshift_images/managing-image-streams.adoc
3+
4+
[id="images-imagestream-import-images-private-registry_{context}"]
5+
= Importing images and image streams from private registries
6+
7+
An image stream can be configured to import tag and image metadata from private image registries requiring authentication. This procedures applies if you change the registry that the Cluster Samples Operator uses to pull content from to something other than link:registry.redhat.io[registry.redhat.io].
8+
9+
[NOTE]
10+
====
11+
When importing from insecure or secure registries, the registry URL defined in the secret must include the `:80` port suffix or the secret is not used when attempting to import from the registry.
12+
====
13+
14+
.Procedure
15+
16+
. You must create a `secret` object that is used to store your credentials by entering the following command:
17+
+
18+
[source,terminal]
19+
----
20+
$ oc create secret generic <secret_name> --from-file=.dockerconfigjson=<file_absolute_path> --type=kubernetes.io/dockerconfigjson
21+
----
22+
+
23+
. After the secret is configured, create the new image stream or enter the `oc import-image` command:
24+
+
25+
[source,terminal]
26+
----
27+
$ oc import-image <imagestreamtag> --from=<image> --confirm
28+
----
29+
+
30+
During the import process, {product-title} picks up the secrets and provides them to the remote party.

modules/images-update-global-pull-secret.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
// Module included in the following assemblies:
22
// * openshift_images/using-image-pull-secrets
3+
// * installing/install_config/customizations.adoc
34

45
[id="images-update-global-pull-secret_{context}"]
56
= Updating the global cluster pull secret
@@ -11,14 +12,19 @@ You can update the global pull secret for your cluster.
1112
Cluster resources must adjust to the new pull secret, which can temporarily limit the usability of the cluster.
1213
====
1314

15+
[WARNING]
16+
====
17+
Updating the global pull secret will cause node reboots while the Machine Config Operator (MCO) syncs the changes.
18+
====
19+
1420
.Prerequisites
1521

1622
* You have a new or modified pull secret file to upload.
1723
* You have access to the cluster as a user with the `cluster-admin` role.
1824

1925
.Procedure
2026

21-
* Run the following command to update the global pull secret for your cluster:
27+
* Enter the following command to update the global pull secret for your cluster:
2228
+
2329
[source,terminal]
2430
----
@@ -27,3 +33,5 @@ $ oc set data secret/pull-secret -n openshift-config --from-file=.dockerconfigjs
2733
<1> Provide the path to the new pull secret file.
2834

2935
This update is rolled out to all nodes, which can take some time depending on the size of your cluster. During this time, nodes are drained and pods are rescheduled on the remaining nodes.
36+
37+
//Also referred to as the cluster-wide pull secret.

modules/samples-operator-overview.adoc

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,16 @@
77
= Understanding the Cluster Samples Operator
88

99
During installation, the Operator creates the default configuration object for
10-
itself and then creates the sample imagestreams and templates, including
11-
quickstart templates.
10+
itself and then creates the sample image streams and templates, including quickstart templates.
1211

1312
[NOTE]
1413
====
15-
To facilitate imagestream imports from other registries that require credentials, a cluster administrator can create any additional secrets that contain the content of a Docker `config.json` file in the `openshift` namespace needed for image import.
14+
To facilitate image stream imports from other registries that require credentials, a cluster administrator can create any additional secrets that contain the content of a Docker `config.json` file in the `openshift` namespace needed for image import.
1615
====
1716

1817
The Cluster Samples Operator configuration is a cluster-wide resource, and the deployment is contained within the `openshift-cluster-samples-operator` namespace.
1918

20-
The image for the Cluster Samples Operator contains imagestream and template definitions
19+
The image for the Cluster Samples Operator contains image stream and template definitions
2120
for the associated {product-title} release. When each sample is created or updated,
2221
the Cluster Samples Operator includes an annotation that denotes the version of
2322
{product-title}. The Operator uses this annotation to ensure that each sample
@@ -29,13 +28,13 @@ automatically.
2928
[NOTE]
3029
====
3130
The Jenkins images are part of the image payload from
32-
installation and are tagged into the imagestreams directly.
31+
installation and are tagged into the image streams directly.
3332
====
3433

3534
The Cluster Samples Operator configuration resource includes a finalizer which cleans up
3635
the following upon deletion:
3736

38-
* Operator managed imagestreams.
37+
* Operator managed image streams.
3938
* Operator managed templates.
4039
* Operator generated configuration resources.
4140
* Cluster status resources.
@@ -46,7 +45,7 @@ resource using the default configuration.
4645
[id="samples-operator-bootstrapped"]
4746
== Cluster Samples Operator's use of management state
4847

49-
The Cluster Samples Operator is bootstrapped as `Managed` by default or if global proxy is configured. In the `Managed` state, the Cluster Samples Operator is actively managing its resources and keeping the component active in order to pull sample imagestreams and images from the registry and ensure that the requisite sample templates are installed.
48+
The Cluster Samples Operator is bootstrapped as `Managed` by default or if global proxy is configured. In the `Managed` state, the Cluster Samples Operator is actively managing its resources and keeping the component active in order to pull sample image streams and images from the registry and ensure that the requisite sample templates are installed.
5049

5150
Certain circumstances result in the Cluster Samples Operator bootstrapping itself as `Removed` including:
5251

@@ -57,13 +56,13 @@ However, if the Cluster Samples Operator also detects an {product-title} global
5756

5857
[IMPORTANT]
5958
====
60-
IPv6 installations are not currently supported by link:https://registry.redhat.io[registry.redhat.io]. The Cluster Samples Operator pulls most of the sample imagestreams and images from link:https://registry.redhat.io[registry.redhat.io].
59+
IPv6 installations are not currently supported by link:https://registry.redhat.io[registry.redhat.io]. The Cluster Samples Operator pulls most of the sample image streams and images from link:https://registry.redhat.io[registry.redhat.io].
6160
====
6261

6362
[id="samples-operator-restricted-network-install"]
6463
=== Restricted network installation
6564

66-
Boostrapping as `Removed` when unable to access `registry.redhat.io` facilitates restricted network installations when the network restriction is already in place. Bootstrapping as `Removed` when network access is restricted allows the cluster administrator more time to decide if samples are desired, because the Cluster Samples Operator does not submit alerts that sample imagestream imports are failing when the management state is set to `Removed`. When the Cluster Samples Operator comes up as `Managed` and attempts to install sample imagestreams, it starts alerting two hours after initial installation if there are failing imports.
65+
Boostrapping as `Removed` when unable to access `registry.redhat.io` facilitates restricted network installations when the network restriction is already in place. Bootstrapping as `Removed` when network access is restricted allows the cluster administrator more time to decide if samples are desired, because the Cluster Samples Operator does not submit alerts that sample image stream imports are failing when the management state is set to `Removed`. When the Cluster Samples Operator comes up as `Managed` and attempts to install sample image streams, it starts alerting two hours after initial installation if there are failing imports.
6766

6867
[id="samples-operator-restricted-network-install-with-access"]
6968
=== Restricted network installation with initial network access
@@ -86,9 +85,9 @@ spec:
8685
----
8786

8887
[id="samples-operator-retries"]
89-
== Cluster Samples Operator's tracking and error recovery of imagestream imports
88+
== Cluster Samples Operator's tracking and error recovery of image stream imports
9089

91-
After creation or update of a samples imagestream, the Cluster Samples Operator monitors the progress of each imagestreamtag's image import.
90+
After creation or update of a samples image stream, the Cluster Samples Operator monitors the progress of each image stream tag's image import.
9291

93-
If an import fails, the Cluster Samples Operator retries the import through the imagestream image import API, which is the same API used by the `oc import-image` command, approximately every 15 minutes until it sees the import succeed, or if
94-
the Cluster Samples Operator's configuration is changed such that either the imagestream is added to the `skippedImagestreams` list, or the management state is changed to `Removed`.
92+
If an import fails, the Cluster Samples Operator retries the import through the image stream image import API, which is the same API used by the `oc import-image` command, approximately every 15 minutes until it sees the import succeed, or if
93+
the Cluster Samples Operator's configuration is changed such that either the image stream is added to the `skippedImagestreams` list, or the management state is changed to `Removed`.

openshift_images/configuring-samples-operator.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,3 +24,8 @@ include::modules/samples-operator-overview.adoc[leveloffset=+1]
2424
include::modules/samples-operator-configuration.adoc[leveloffset=+1]
2525

2626
include::modules/samples-operator-crd.adoc[leveloffset=+1]
27+
28+
[discrete]
29+
== Additional resources
30+
31+
For more information about configuring credentials, see xref:../openshift_images/managing_images/using-image-pull-secrets.adoc#using-image-pull-secrets[Using image pull secrets].

openshift_images/image-streams-manage.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,3 +30,6 @@ include::modules/images-imagestream-external-image-tags.adoc[leveloffset=+2]
3030
include::modules/images-imagestream-update-tag.adoc[leveloffset=+2]
3131
include::modules/images-imagestream-remove-tag.adoc[leveloffset=+2]
3232
include::modules/images-imagestream-import.adoc[leveloffset=+2]
33+
34+
include::modules/images-imagestream-import-images-private-registry.adoc[leveloffset=+1]
35+
include::modules/images-allow-pods-to-reference-images-from-secure-registries.adoc[leveloffset=+2]

openshift_images/managing_images/using-image-pull-secrets.adoc

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,35 @@ include::modules/common-attributes.adoc[]
66
toc::[]
77

88
If you are using {product-title}'s internal registry and are pulling from
9-
imagestreams located in the same project, then your Pod's service account should
9+
image streams located in the same project, then your pod's service account should
1010
already have the correct permissions and no additional action should be
1111
required.
1212

1313
However, for other scenarios, such as referencing images across {product-title}
1414
projects or from secured registries, then additional configuration steps are
1515
required.
1616

17+
You can obtain the image pull secret, `pullSecret`, from the link:https://cloud.redhat.com/openshift/install/pull-secret[Pull Secret] page on the {cloud-redhat-com} site.
18+
19+
You use this pull secret to authenticate with the services that are provided by the included authorities, including link:quay.io[Quay.io] and link:registry.redhat.io[registry.redhat.io], which serve the container images for {product-title} components.
20+
21+
.Example `config.json` file
22+
[source,json]
23+
----
24+
{
25+
"auths":{
26+
"cloud.openshift.com":{
27+
"auth":"b3Blb=",
28+
29+
},
30+
"quay.io":{
31+
"auth":"b3Blb=",
32+
33+
}
34+
}
35+
}
36+
----
37+
1738
include::modules/images-allow-pods-to-reference-images-across-projects.adoc[leveloffset=+1]
1839

1940
include::modules/images-allow-pods-to-reference-images-from-secure-registries.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)