This project contains OpenShift v3 application templates which support applications based on Red Hat Fuse.
See http://www.opensourcerers.org/first-fuse-application-on-openshift-v3-1/
Before you can import and use the Red Hat Fuse OpenShift Image Streams, you must first configure authentication to the Red Hat container registry. This may have already been set up for you by your cluster administrator. If not, follow the instructions bellow.
Within the OpenShift project where you'll be installing the Red Hat Fuse Image Streams, create a docker-registry secret using credentials for either a Red Hat Developer Program account or Red Hat Customer Portal account. For example:
oc create secret docker-registry imagestreamsecret \
--docker-server=registry.redhat.io \
--docker-username=CUSTOMER_PORTAL_USERNAME \
--docker-password=CUSTOMER_PORTAL_PASSWORD \
--docker-email=EMAIL_ADDRESS
If you don’t want to use your Red Hat account’s username and password to create the secret, it is recommended to create an authentication token using a registry service account.
For further information see:
The fis-image-streams.json
file contains ImageStream definitions for Red Hat Fuse on OpenShift. This will need to be installed within
the openshift
namespace (oc create -f fis-image-streams.json -n openshift
) before using any of the quickstart templates.
The easiest way to use the quickstart templates is to install them in your project
$ oc create -n openshift -f fis-image-streams.json
$ oc create -n myproject -f quickstart-template.json
After installing templates, you should see the quickstarts in the OpenShift catalog. Select one, and you will be prompted to provide template parameters.
Alternatively, you can install the template and create a new application from the command line:
$ oc create -n openshift -f fis-image-streams.json
$ oc process -n yourproject -f quickstart-template.json -v <template parameters> | oc create -n yourproject -f -
To make templates available to all users, install them into the openshift
namespace:
$ oc create -n openshift -f quickstart-template.json
The Red Hat Fuse console eases the discovery and management of Fuse applications deployed on OpenShift.
You can run the following instructions to deploy the Fuse console on your OpenShift cluster. There exist different OpenShift templates to choose from, depending on the following characteristics:
Template | Descripton |
---|---|
fis-console-cluster-template.json | Use an OAuth client that requires the cluster-admin role to be created. The Fuse console can discover and connect to Fuse applications deployed across multiple namespaces / projects. |
fuse-console-cluster-os4.json | Same as fis-console-cluster-template.json , to be used for OpenShift 4. By default, this requires the generation of a client certificate, signed with the service signing certificate authority, prior to the deployment. See OpenShift 4 section for more information. |
fis-console-namespace-template.json | Use a service account as OAuth client, which only requires admin role in a project to be created. This restricts the Fuse console access to this single project, and as such acts as a single tenant deployment. |
fuse-console-namespace-os4.json | Same as fis-console-namespace-template.json , to be used for OpenShift 4. By default, this requires the generation of a client certificate, signed with the service signing certificate authority, prior to the deployment. See OpenShift 4 section for more information. |
For example, to install the Fuse console template, execute the following command:
$ oc create -n myproject -f fis-console-namespace-template.json
Then, you should be able to see the template after navigating to Add to Project > Select from Project in your project.
Or, if you prefer the command line:
$ oc new-app -n myproject -f fis-console-namespace-template.json \
-p ROUTE_HOSTNAME=<HOST>
Note that the ROUTE_HOSTNAME
parameter can be omitted when using the fis-console-namespace-template
template.
In that case, OpenShift automatically generates one for you.
You can obtain more information about the template parameters, by executing the following command:
$ oc process --parameters -f fis-console-namespace-template.json
NAME DESCRIPTION VALUE
APP_NAME The name assigned to the application. fuse70-console
APP_VERSION The application version. 1.0
IMAGE_STREAM_NAMESPACE Namespace in which the Fuse ImageStreams are installed. These ImageStreams
are normally installed in the openshift namespace. You should only need to
modify this if you've installed the ImageStreams in a different
namespace/project. openshift
ROUTE_HOSTNAME The externally-reachable host name that routes to the Red Hat Fuse console
service
CPU_REQUEST The amount of CPU to request. 0.2
MEMORY_REQUEST The amount of memory required for the container to run. 32Mi
CPU_LIMIT The amount of CPU the container is limited to use. 1.0
MEMORY_LIMIT The amount of memory the container is limited to use. 32Mi
You can obtain the status of your deployment, by running:
$ oc status
In project myproject on server https://192.168.64.12:8443
https://fuse-console.192.168.64.12.nip.io (redirects) (svc/fuse70-console-service)
dc/fuse70-console deploys openshift/jboss-fuse70-console:1.0
deployment #1 deployed 2 minutes ago - 1 pod
Open the route URL displayed above from your Web browser to access the Fuse console.
To secure the communication between the Fuse Console and the Jolokia agents, a client certificate must be generated and mounted into the Fuse Console pod with a secret, to be used for TLS client authentication. This client certificate must be signed using the service signing certificate authority private key.
Here are the steps to be performed prior to the deployment:
First, retrieve the service signing certificate authority keys, by executing the following commmands as a cluster-admin user:
# The CA certificate
$ oc get secrets/signing-key -n openshift-service-ca -o "jsonpath={.data['tls\.crt']}" | base64 --decode > ca.crt
# The CA private key
$ oc get secrets/signing-key -n openshift-service-ca -o "jsonpath={.data['tls\.key']}" | base64 --decode > ca.key
Then, generate the client certificate, as documented in Kubernetes certificates administration, using either easyrsa
, openssl
, or cfssl
, e.g., using openssl
:
# Generate the private key
$ openssl genrsa -out server.key 2048
# Write the CSR config file
$ cat <<EOT >> csr.conf
[ req ]
default_bits = 2048
prompt = no
default_md = sha256
distinguished_name = dn
[ dn ]
CN = fuse-console.fuse.svc
[ v3_ext ]
authorityKeyIdentifier=keyid,issuer:always
keyUsage=keyEncipherment,dataEncipherment,digitalSignature
extendedKeyUsage=serverAuth,clientAuth
EOT
# Generate the CSR
$ openssl req -new -key server.key -out server.csr -config csr.conf
# Issue the signed certificate
$ openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt -days 10000 -extensions v3_ext -extfile csr.conf
Finally, you can create the secret to be mounted in the Fuse Console, from the generated certificate:
$ oc create secret tls ${APP_NAME}-tls-proxying --cert server.crt --key server.key
Note that CN=fuse-console.fuse.svc
must be trusted by the Jolokia agents, for which client certification authentication is enabled. See the clientPrincipal
parameter from the Jolokia agent configuration options.
You can then proceed with the deployment.
The Fuse console can also be deployed on Kubernetes. You can run the following instructions to deploy the Fuse console on your Kubernetes cluster. There exist different YAML resources files to choose from, depending on the following characteristics:
File | Descripton |
---|---|
fuse-console-cluster-k8s.yml | The Fuse console can discover and connect to Fuse applications deployed across multiple namespaces. |
fuse-console-namespace-k8s.yml | This restricts the Fuse console access to a single namespace, and as such acts as a single tenant deployment. |
Before deploying the Fuse console, you need to create a serving certificate for the Fuse console TLS.
Follow the steps below to create a secret named fuse-console-tls-serving
with the serving certificate:
Prepare a TLS certificate and private key for the Fuse console. For development purposes, you can generate a self-signed certificate with the following commmands:
# Generate the private key
$ openssl genrsa -out tls.key 2048
# Generate the certificate (valid for 365 days)
$ openssl req -x509 -new -nodes -key tls.key -subj "/CN=fuse-console.fuse.svc" -days 365 -out tls.crt
Create the secret to be mounted in the Fuse console from the certificate and private key in the first step:
$ kubectl create -n myproject secret tls fuse-console-tls-serving --cert tls.crt --key tls.key
Now you can move on to deploy the Fuse console. For example, to install it in a single namespace, execute the following command:
$ kubectl apply -n myproject -f fuse-console-namespace-k8s.yml
By default it creates a NodePort
service for access to the console, but you can choose other options to expose the console: NodePort
/ LoadBalancer
Service or Ingress. For Ingress, suppose the FQDN you provide for the Fuse console is fuse.example.com
, run the following command to create an ingress for the console:
$ cat <<EOF | kubectl apply -f -
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: fuse-console-ingress
labels:
component: fuse-console
group: console
app: fuse-console
version: "1.13"
annotations:
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$1
spec:
tls:
- hosts:
- fuse.example.com
secretName: fuse-console-tls-serving
rules:
- host: fuse.example.com
http:
paths:
- path: /(.*)
pathType: Prefix
backend:
service:
name: fuse-console-service
port:
number: 443
EOF
NOTE: To make ingresses work on your Kubernetes cluster, an Ingress controller needs to be running. See Ingress Controllers for more information.
For how to create a user for the Fuse console on Kubernetes, see Creating a Hawtio user for Form authentication.
The fuse-console-cluster-rbac.yml
and fuse-console-namespace-rbac.yml
templates create a ConfigMap, that contains the configuration file used to define the roles allowed for MBean operations.
This ConfigMap is mounted into the Fuse console container, and the HAWTIO_ONLINE_RBAC_ACL
environment variable is used to pass the configuration file path to the server.
If that environment variable is not set, RBAC support is disabled, and only users granted the update
verb on the pod resources are authorized to call MBeans operations.
For the time being, only the viewer
and admin
roles are supported.
Once the current invocation is authenticated, these roles are inferred from the permissions the user impersonating the request is granted for the pod hosting the operation being invoked.
A user that's granted the update
verb on the pod resource is bound to the admin
role, i.e.:
$ oc auth can-i update pods/<pod> --as <user>
yes
Else, a user granted the get
verb on the pod resource is bound the viewer
role, i.e.:
$ oc auth can-i get pods/<pod> --as <user>
yes
Otherwise the user is not bound any roles, i.e.:
$ oc auth can-i get pods/<pod> --as <user>
no
The ACL definition for JMX operations works as follows:
Based on the ObjectName of the JMX MBean, a key composed with the ObjectName domain, optionally followed by the type
attribute, can be declared, using the convention <domain>.<type>
.
For example, the java.lang.Threading
key for the MBean with the ObjectName java.lang:type=Threading
can be declared.
A more generic key with the domain only can be declared (e.g. java.lang
).
A default
top-level key can also be declared.
A key can either be an unordered or ordered map, whose keys can either be string or regexp, and whose values can either be string or array of strings, that represent roles that are allowed to invoke the MBean member.
The default ACL definition can be found in the ${APP_NAME}-rbac
ConfigMap from the fuse-console-cluster-rbac.yml
and fuse-console-namespace-rbac.yml
templates.
The system looks for allowed roles using the following process:
The most specific key is tried first. E.g. for the above example, the java.lang.Threading
key is looked up first.
If the most specific key does not exist, the domain-only key is looked up, otherwise, the default
key is looked up.
Using the matching key, the system looks up its map value for:
An exact match for the operation invocation, using the operation signature, and the invocation arguments, e.g.:
uninstall(java.lang.String)[0]: [] # no roles can perform this operation
A regexp match for the operation invocation, using the operation signature, and the invocation arguments, e.g.:
/update\(java\.lang\.String,java\.lang\.String\)\[[1-4]?[0-9],.*\]/: admin
Note that, if the value is an ordered map, the iteration order is guaranteed, and the first matching regexp key is selected;
An exact match for the operation invocation, using the operation signature, without the invocation arguments, e.g.:
delete(java.lang.String): admin
An exact match for the operation invocation, using the operation name, e.g.:
dumpStatsAsXml: admin, viewer
If the key matches the operation invocation, it is used and the process will not look for any other keys. So the most specific key always takes precedence.
Its value is used to match the role that impersonates the request, against the roles that are allowed to invoke the operation.
If the current key does not match, the less specific key is looked up and matched following the steps 1 to 4 above, up until the default
key.
Otherwise, the operation invocation is denied.
To learn how to use Prometheus and Grafana to monitor Fuse on Openshift 4, follow this guide. Fuse provides a number of example dashboards. We also have instructions on how to use Fuse and Prometheus on Openshift 3