You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Addresses #1273
# Summary
This pass does three things:
1. Updates all tutorials related to Operator/Tenant deployment for
Kustomize and Helm
2. Removes references to Operator Console + updates to reference
Kustomize/Helm wherever possible
3. Slightly tidies up old or dangling references
This pass does not do these things:
- Link out heavily to Kubernetes docs (for later)
- Clean up organization (singleplat build handles this)
- Addresses OpenShift, Rancher, etc.
---------
Co-authored-by: Andrea Longo <[email protected]>
Co-authored-by: Allan Roger Reid <[email protected]>
Co-authored-by: Daryl White <[email protected]>
Copy file name to clipboardExpand all lines: source/administration/console/managing-deployment.rst
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,12 @@ You can use the MinIO Console to perform many of the deployment monitoring and m
18
18
- Set up :ref:`site replication <minio-console-site-replication>` to synchronize datacenters for timely access across geographically dispersed workforces or for disaster preparedness.
The MinIO Console is a web-based interface for the MinIO Server.
24
+
25
+
It is distinct and independent from the MinIO Kubernetes Operator Console which was deprecated and removed as of Operator 6.0.0.
26
+
21
27
.. _minio-console-monitoring:
22
28
23
29
Monitoring
@@ -62,8 +68,6 @@ Audit
62
68
63
69
The Audit Log section provides an interface for viewing :ref:`audit logs <minio-logging>` collected by a configured PostgreSQL service.
64
70
65
-
The Audit Logging feature is configured and enabled automatically for MinIO deployments created using the :ref:`MinIO Operator Console <minio-operator-console>`.
SA_TOKEN=$(kubectl -n minio-operator get secret console-sa-secret -o jsonpath="{.data.token}"| base64 --decode)
152
-
echo $SA_TOKEN
153
-
154
-
The output of this command is the JSON Web Token (JWT) login credential for Operator Console.
155
-
156
-
#. Log into the MinIO Operator Console
157
-
158
-
159
-
.. tab-set::
160
-
161
-
.. tab-item:: NodePort
162
-
:selected:
163
-
164
-
If you configured the service for access through a NodePort, specify the hostname of any worker node in the cluster with that port as ``HOSTNAME:NODEPORT`` to access the Console.
165
-
166
-
For example, a deployment configured with a NodePort of 30090 and the following ``InternalIP`` addresses can be accessed at ``http://172.18.0.5:30090``.
167
-
168
-
.. code-block:: shell
169
-
:class: copyable
170
-
171
-
kubectl get nodes -o custom-columns=IP:.status.addresses[:]
If you configured the ``svc/console`` service for access through ingress or a cluster load balancer, you can access the Console using the configured hostname and port.
182
-
183
-
.. tab-item:: Port Forwarding
184
-
185
-
You can use ``kubectl port forward`` to temporary forward ports for the Console:
Copy file name to clipboardExpand all lines: source/includes/k8s/deploy-operator.rst
+16-20Lines changed: 16 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,16 +31,15 @@ While this documentation *may* provide guidance for configuring or deploying Kub
31
31
MinIO Operator Components
32
32
-------------------------
33
33
34
-
The MinIO Operator exists in its own namespace.
35
-
Within the Operator's namespace, the MinIO Operator utilizes two pods:
34
+
The MinIO Operator exists in its own namespace in which it creates Kubernetes resources.
35
+
Those resources includes pods, services, replicasets, and deployments.
36
36
37
-
- The Operator pod for the base Operator functions to deploy, manage, modify, and maintain tenants.
38
-
- Console pod for the Operator's Graphical User Interface, the Operator Console.
37
+
The Operator pods monitor all namespaces by default for objects using the MinIO CRD and manages those resources automatically.
39
38
40
39
When you use the Operator to create a tenant, the tenant *must* have its own namespace.
41
40
Within that namespace, the Operator generates the pods required by the tenant configuration.
42
41
43
-
Each pod runs three containers:
42
+
Each Tenant pod runs three containers:
44
43
45
44
- MinIO Container that runs all of the standard MinIO functions, equivalent to basic MinIO installation on baremetal.
46
45
This container stores and retrieves objects in the provided mount points (persistent volumes).
@@ -51,32 +50,29 @@ Each pod runs three containers:
51
50
- SideCar container that monitors configuration secrets for the tenant and updates them as they change.
52
51
This container also monitors for root credentials and creates an error if it does not find root credentials.
53
52
54
-
Starting with v5.0.6, the MinIO Operator supports custom :kube-docs:`init containers <concepts/workloads/pods/init-containers>` for additional pod initialization that may be required for your environment.
55
-
56
53
The tenant utilizes Persistent Volume Claims to talk to the Persistent Volumes that store the objects.
MinIO tests |operator-version-stable| against a floor of Kubernetes API of |k8s-floor|.
71
+
MinIO **strongly recommends** maintaining Kubernetes infrastructure using `actively maintained Kubernetes API versions <https://kubernetes.io/releases/>`__.
74
72
75
-
Starting with v5.0.0, MinIO **requires** Kubernetes 1.21.0 or later for both the infrastructure and the ``kubectl`` CLI tool.
76
73
77
-
.. versionadded:: Operator 5.0.6
74
+
MinIO **strongly recommends** upgrading Kubernetes clusters running with `End-Of-Life API versions <https://kubernetes.io/releases/patch-releases/#non-active-branch-history>`__
78
75
79
-
For Kubernetes 1.25.0 and later, MinIO supports deploying in environments with the :kube-docs:`Pod Security admission (PSA) <concepts/security/pod-security-admission>` ``restricted`` policy enabled.
80
76
81
77
82
78
Kustomize and ``kubectl``
@@ -100,7 +96,7 @@ Kubernetes TLS Certificate API
100
96
The MinIO Operator manages TLS Certificate Signing Requests (CSR) using the Kubernetes ``certificates.k8s.io`` :kube-docs:`TLS certificate management API <tasks/tls/managing-tls-in-a-cluster/>` to create signed TLS certificates in the following circumstances:
101
97
102
98
- When ``autoCert`` is enabled.
103
-
- For the MinIO Console when the :envvar:`MINIO_CONSOLE_TLS_ENABLE` environment variable is set to ``on``.
99
+
- For the MinIO Tenant Console when the :envvar:`MINIO_CONSOLE_TLS_ENABLE` environment variable is set to ``on``.
104
100
- For :ref:`STS service <minio-security-token-service>` when :envvar:`OPERATOR_STS_ENABLED` environment variable is set to ``on``.
Copy file name to clipboardExpand all lines: source/includes/k8s/steps-configure-keycloak-identity-management.rst
-48Lines changed: 0 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,59 +37,11 @@ Set the value to any :ref:`policy <minio-policy>` on the MinIO deployment.
37
37
38
38
MinIO supports multiple methods for configuring Keycloak authentication:
39
39
40
-
- Using the MinIO Operator Console
41
40
- Using the MinIO Tenant Console
42
41
- Using a terminal/shell and the :mc:`mc idp openid` command
43
42
44
43
.. tab-set::
45
44
46
-
.. tab-item:: MinIO Operator Console
47
-
48
-
You can use the MinIO Operator Console to configure Keycloak as the External Identity Provider for the MinIO Tenant.
49
-
See :ref:`minio-operator-console-connect` for specific instructions.
50
-
51
-
Select :guilabel:`Identity Provider` from the left-hand navigation bar, then select :guilabel:`OpenID`.
52
-
Select :guilabel:`Create Configuration` to create a new configuration.
53
-
54
-
Enter the following information into the modal:
55
-
56
-
.. list-table::
57
-
:stub-columns: 1
58
-
:widths: 30 70
59
-
:width: 100%
60
-
61
-
* - :guilabel:`Name`
62
-
- Enter a unique name for the Keycloak instance
63
-
64
-
* - :guilabel:`Config URL`
65
-
- Specify the address of the Keycloak OpenID configuration document (|KEYCLOAK_URL|)
66
-
67
-
Ensure the ``REALM`` matches the Keycloak realm you want to use for authenticating users to MinIO
68
-
69
-
* - :guilabel:`Client ID`
70
-
- Specify the name of the Keycloak client created in Step 1
71
-
72
-
* - :guilabel:`Client Secret`
73
-
- Specify the secret credential value for the Keycloak client created in Step 1
74
-
75
-
* - :guilabel:`Display Name`
76
-
- Specify the user-facing name the MinIO Console should display as part of the Single-Sign On (SSO) workflow for the configured Keycloak service
77
-
78
-
* - :guilabel:`Scopes`
79
-
- Specify the OpenID scopes to include in the JWT, such as ``preferred_username`` or ``email``
80
-
81
-
You can reference these scopes using supported OpenID policy variables for the purpose of programmatic policy configurations
82
-
83
-
* - :guilabel:`Redirect URI Dynamic`
84
-
- Toggle to ``on``
85
-
86
-
Substitutes the MinIO Console address used by the client as part of the Keycloak redirect URI.
87
-
Keycloak returns authenticated users to the Console using the provided URI.
88
-
89
-
For MinIO Console deployments behind a reverse proxy, load balancer, or similar network control plane, you can instead use the :envvar:`MINIO_BROWSER_REDIRECT_URL` variable to set the redirect address for Keycloak to use.
90
-
91
-
Select :guilabel:`Save` to apply the configuration.
92
-
93
45
.. tab-item:: MinIO Tenant Console
94
46
95
47
You can use the MinIO Tenant Console to configure Keycloak as the External Identity Provider for the MinIO Tenant.
Copy file name to clipboardExpand all lines: source/includes/openshift/deploy-minio-on-openshift.rst
+2-23Lines changed: 2 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,7 @@ Once installation completes, click :guilabel:`View Operator` to view the MinIO O
133
133
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
134
134
135
135
If you have installed the MinIO Operator from Red Hat OperatorHub, the installation process also configures the :openshift-docs:`OpenShift Service CA Operator <security/certificate_types_descriptions/service-ca-certificates.html>`.
136
-
This Operator manages the TLS certificates required to access the MinIO Operator Console and Tenants.
136
+
This Operator manages the TLS certificates required to access MinIO Tenants.
137
137
It automatically renews and rotates the certificates 13 months before expiration.
138
138
No additional action is required.
139
139
@@ -287,29 +287,8 @@ You can find the MinIO Operator Interface from the :guilabel:`Operators` left-ha
287
287
3. Select :guilabel:`MinIO Operators` from the list of installed operators.
288
288
The :guilabel:`Status` column must read :guilabel:`Success` to access the Operator interface.
289
289
290
-
5) Access the Operator Console
291
-
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
292
290
293
-
The MinIO Operator includes the Operator Console, a browser-based management interface for managed MinIO tenants.
You can create a permanent routing rule by creating a :openshift-docs:`Route or Ingress <networking/understanding-networking.html#nw-ne-comparing-ingress-route_understanding-networking>` to allow access from external clients, such as your local computer browser.
298
-
299
-
The following steps provides a summary of actions necessary to create a Route.
300
-
301
-
#. From :guilabel:`Networking`, go to :guilabel:`Routes`
302
-
#. Create a new Route in the MinIO Operator project.
303
-
Select a recognizable route name, such as ``operator-console-route``.
304
-
#. Set the :guilabel:`Hostname` as per your organizations networking and hostname topology.
305
-
Omit the hostname to allow OpenShift to generate it automatically
306
-
#. Set the :guilabel:`Service` to :guilabel:`console`
307
-
#. Set the :Guilabel:`Target Port` to ``9090``
308
-
309
-
You can then access the Operator Console using the configured Route.
310
-
The Operator Console still requires using the generated JWT token for access, which you can generate at any time using ``oc minio port-forward``.
311
-
312
-
6) Next Steps
291
+
5) Next Steps
313
292
~~~~~~~~~~~~~
314
293
315
294
After deploying the MinIO Operator, you can create a new MinIO Tenant.
0 commit comments