document PHX OpenShift instance

Description

Splitting from to document typical tasks of OpenShift management on readthedocs

Activity

Show:

Former user January 16, 2018 at 1:05 PM

Documentation patch merged, closing

Marc Dequènes (Duck) December 1, 2017 at 11:59 PM

We can use ansible-vault, like we already do in the infra-ansible repository. It has not been proven weak at the moment and as it just wraps up automatic decrypting when playing the playbook using already existing crypto libs and cypher, I don't think the Ansible part of the implementation would introduce problems.

Another way is used by Misc in Gluster: having two repositories, one public with all the rules, one private with the secrets, then you have to merge the two before using it. It's cumbersome to do it manually of course, but this case they use a bastion in charge of playing the changed parts when you push your work. It's an idea I suggested to explore, even if you might wish to improve it.

I don't know any other working and secure method at the moment. ansible-valt seem to be trusted and I did not have any problem in my personal projects either using it. It's also quite straightforward to setup and use (see the doc about ansible-vault+git in the infra-ansible README).

Former user December 1, 2017 at 2:28 PM

Started documenting the setup. - what's the best option to store ansible hosts files if they contain private info like google authenticator credentials? It would be great to have them in config management somewhere.

Eyal Edri November 30, 2017 at 9:10 AM

Can you add some info on the version we installed and the deployment itself?
We should do an oVirt blog on it as there is already a reference architecture of running OpenShift on RHV, so this might be very interesting and relevant for a blog, especially with the use cases we're aiming it for.

Done

Details

Assignee

Reporter

Priority

Created June 27, 2017 at 12:13 PM
Updated January 31, 2018 at 3:33 PM
Resolved January 16, 2018 at 1:05 PM