diff --git a/docs/modules/ROOT/pages/how-tos/cloudscale/decommission.adoc b/docs/modules/ROOT/pages/how-tos/cloudscale/decommission.adoc index 565cd0d6..587e925c 100644 --- a/docs/modules/ROOT/pages/how-tos/cloudscale/decommission.adoc +++ b/docs/modules/ROOT/pages/how-tos/cloudscale/decommission.adoc @@ -143,21 +143,7 @@ At this point in the decommissioning process, you'll have to extract the Restic . Delete all other Vault entries -. Delete LDAP service (via portal) -+ -Go to https://control.vshn.net/vshn/services -+ -- Search cluster name -+ -- Delete cluster entry service using the delete button - -. Remove IPs from LDAP allowlist -+ -Edit https://git.vshn.net/vshn-puppet/vshn_hieradata/-/blob/master/corp/prod/ldap.yaml -+ -- Search cluster IPs and remove those lines and any comments related. -+ -- Create a Merge Request and invite a colleague for a review/approve/merge +include::partial$decommission/idp.adoc[] . Delete all DNS records related with cluster (zonefiles) diff --git a/docs/modules/ROOT/pages/how-tos/cloudscale/install.adoc b/docs/modules/ROOT/pages/how-tos/cloudscale/install.adoc index 680653f2..eb474aa9 100644 --- a/docs/modules/ROOT/pages/how-tos/cloudscale/install.adoc +++ b/docs/modules/ROOT/pages/how-tos/cloudscale/install.adoc @@ -195,9 +195,9 @@ vault kv put clusters/kv/${TENANT_ID}/${CLUSTER_ID}/floaty \ vault kv put clusters/kv/${TENANT_ID}/${CLUSTER_ID}/registry \ httpSecret=$(LC_ALL=C tr -cd "A-Za-z0-9" _ <1> +Access Type = confidential +Valid Redirect URIs = https://oauth-openshift.apps.cluster-id.tld/oauth2callback/VSHN <2> +Base URL = https://console-openshift-console.apps.cluster-id.tld/ <3> +---- +<1> Create a separate client for each cluster. +The client ID shall use the format `ocp__`. +<2> The Redirect URI assumes that the authentication method in the OpenShift cluster is named `VSHN`. +<3> Adjust the Base URL to match the desired web console URL of your cluster. ++ +Use https://TBD to create a client. +The name must contain the customer and the cluster name. ++ +TODO: Add required config for authentication flow & mappers + +. Save the Keycloak client details (client ID and secret) in the following variables for subsequent steps. ++ +[source,bash] +---- +export KEYCLOAK_CLIENT_ID="Your_client_ID_here" +export KEYCLOAK_CLIENT_SECRET="Your_client_secret" +----