Configuring a Persistent Static IP on RHEL/CentOS/AlmaLinux with nmcli
- Best Practices & Patterns, Linux Basics, Networking, Security & Hardening, System Administration
- February 6, 2015
In this step-by-step guide, we will configure HTPasswd authentication on an existing OpenShift 4.15+ single-node cluster. We’ll create user accounts, update the cluster’s OAuth settings to use HTPasswd, and verify access via both the CLI and the web console. We’ll also cover how to assign admin privileges to a new user and remove the default kubeadmin user for security.
READ MORERed Hat Advanced Cluster Management for Kubernetes (RHACM) is a powerful tool that lets you manage multiple OpenShift and Kubernetes clusters from one place. In this beginner-friendly guide, we will walk through installing RHACM version 2.4.x (or higher) on a bare metal OpenShift cluster using the OperatorHub, and then importing an existing cluster for management. The steps are straightforward and use the OpenShift web console for ease of use
READ MOREKeeping disk pressure under control is a day-to-day chore for cluster admins. Left unchecked, old container images, completed builds, logs and stray volumes will quietly eat through node storage and the internal registry PVC, eventually triggering pod evictions or broken pushes. This post walks through a layered strategy for reclaiming and preventing waste—starting with the integrated image registry and ending with node-level log rotation.
READ MOREThis content outlines the integration of GitLab CI/CD with OpenShift for deploying containerized applications. It discusses prerequisites, initial setup, service accounts, CI/CD variables, and pipeline configuration. Security best practices are emphasized to ensure safe deployment processes. An example demonstrates deploying a Node.js app, highlighting continuous delivery benefits.
READ MORESidecar containers in OpenShift and Kubernetes are designed to extend functionality by running alongside main application containers within the same Pod. They offer benefits such as modularization, improved reusability, and simplified code. Common use cases include logging, security, and data synchronization. Best practices and scenarios for avoiding sidecars are also discussed.
READ MORE