Refresh the solution namespace whenever cluster certificates are updated
Whenever you replace the security certificates in the OpenShift Container Platform cluster, you must refresh the IBM® Security Center for Z namespace to use the new certificates. This standard maintenance procedure ensures that IBM Security Center for Z uses the correct certificates.
Before you begin
- Log in to the Red Hat OpenShift Container Platform web console for your cluster. Then, click your user name in the upper-right corner, and click Copy Login Command.
- In the new browser tab that opens, click Display Token. Then, copy the command that is displayed under Log in with this token.
- In a command line, paste the command that you copied in the preceding step to log in to Red Hat
OpenShift Container Platform.
It is assumed that the OpenShift Container Platform command-line interface (CLI) is installed in a directory that is in your PATH. The CLI is installed when you download the Red Hat OpenShift CLI binary. For more information, see Getting started with the OpenShift CLI.
Tip: To verify that the CLI is installed, enter the following command:oc version
About this task
By default, Red Hat OpenShift Container Platform (RHOCP) issues certificates that are valid for the applications that run in the OpenShift Container Platform cluster. IBM Security Center for Z uses these certificates as well.
Whenever your installation updates the OpenShift Container Platform cluster certificates, you must delete and restart the IBM Security Center for Z instance (in ibmz-scc namespace). This standard maintenance procedure ensures that the existing tls-credentials secret, which contains the outdated certificates, is recreated with the new certificates. Otherwise, if this action is not taken, IBM Security Center for Z cannot perform new scans until the outdated certificates are replaced.
To perform this procedure, you will delete the IBM Security Center for Z instance, then restart it. The newly created pods will use the updated secret. This action does not result in any data loss; persistent storage is not changed.
This activity requires that you log in to Red Hat OpenShift Container Platform with your cluster-admin user role. That is, you log in to the cluster through the command line under a user identity that is bound to the cluster-admin ClusterRole. If you are assigned another role, ask a cluster-admin role user to grant you access or add you to a group that has cluster-admin privileges. Only a cluster-admin role user can grant other users the cluster-admin access.
Procedure
What to do next
Wait for all the pods to be up and running, which takes around 5 - 10 minutes.
oc get pods -n ibmz-sccRESTARTS and AGE.
NAME READY STATUS
keycloak-xxxx 1/1 Running
postgres-0 1/1 Running
scp-alembic-xxxx 0/1 Completed
scc-controller-xxxx 1/1 Running
scc-ui-xxxx 1/1 Running
- A total of 5 pods are created. In the figure, xxxx are random strings in the pod names.
- READY and STATUS values appear as shown.