OpenShift Security Operations: Difference between revisions
Jump to navigation
Jump to search
Line 43: | Line 43: | ||
cd ~/tmp | cd ~/tmp | ||
oc extract secret/logging-kibana-proxy [--keys=oauth-secret] --confirm | oc extract secret/logging-kibana-proxy [--keys=oauth-secret] --confirm | ||
=Service Account Operations= | |||
==Query Service Accounts for a Project== | |||
oc get sa | |||
==Create a New Service Account== | |||
oc create |
Revision as of 20:45, 18 October 2017
Internal
List All Cluster Role Bindings
oc get clusterrolebindings
List Role Bindings for a Specific Role
oc get clusterrolebindings/cluster-admins
Make a User a Cluster Administrator
This command can be used to make regular users cluster administrators:
oadm policy add-cluster-role-to-user cluster-admin ovidiu
Enable system:admin Remote Access
OAuth Client Operations
List all OAuth clients:
oc get oauthclients
List one:
oc get oauthclient kibana-proxy
oc edit oauthclient kibana-proxy
'Secret' Operations
List all secrets:
oc get secrets
Extract data from a given secret:
cd ~/tmp oc extract secret/logging-kibana-proxy [--keys=oauth-secret] --confirm
Service Account Operations
Query Service Accounts for a Project
oc get sa
Create a New Service Account
oc create