ibm-mas-operator
- ltpakeysgenerator
- coreapi
- internalapi
- admindashboard
- homepage
- navigator
- usersynccoordinator
- groupsynccoordinator
- workspacecoordinator
- catalogmgr
- catalogapi
- mobileapi
- monagentmas
ibm-mas-operator
Kubernetes control plane
Controller managers
ibm-mas-operator
ibm-mas-operator
watches Suite.core.mas.ibm.com, acts as the primary controller manager for an installation of the Maximo Application Suite core services, installing all required entity managers and provisioning the primary resources detailed on this page.ibm-truststore-mgr-controller-manager
watches Truststore.ibm-truststore-mgr.ibm.com and manages all of the truststores in use in the core services namespace.entitymgr-addons
add ons configuration.entitymgr-bascfg
watches BASCfg.config.mas.ibm.com, manages the UDS integration with Maximo Application Suite.entitymgr-coreidp
watches CoreIDP.internal.mas.ibm.com, manages the Core IDP component.entitymgr-idpcfg
watches IDPCfg.config.mas.ibm.com, manages IDP integration with Maximo Application Suite.entitymgr-jdbccfg
watches JDBCCfg.config.mas.ibm.com, manages JDBC integration with Maximo Application Suite, performing configuration validation.entitymgr-kafkacfg
watches KafkaCfg.config.mas.ibm.com, manages Kafka integration with Maximo Application Suite, performing configuration validation.entitymgr-jdbccfg
watches MongoCfg.config.mas.ibm.com, manages Mongo integration with Maximo Application Suite, performing configuration validation.entitymgr-objectstorage
watches ObjectStorageCfg.config.mas.ibm.com, manages ObjectStorage integration with Maximo Application Suite, performing configuration validation.entitymgr-pushnotificationcfg
, watches PushNotificationCfg.config.mas.ibm.com, manages PushNotification integration with Maximo Application Suite, performing configuration validation.entitymgr-scimcfg
watches SCIMCfg.config.mas.ibm.com, manages SCIM (LDAP User sync) integration with Maximo Application Suite, performing configuration validation and resources creation such as scimsync-agent
job and scimsync liberty
pod.entitymgr-slscfg
watches SLSCfg.config.mas.ibm.com, manages SLS integration with Maximo Application Suite, performing configuration validation and resources creation such as licensing-mediator pod. This pod is also responsible to register the SLS client in the SLS server.entitymgr-smtpcfg
watches SMTPCfg.config.mas.ibm.com, manages SMTP integration with Maximo Application Suite, performing configuration validation.entitymgr-watsonstudiocfg
watches WatsonStudioCfg.config.mas.ibm.com, manages Watson™ Studio integration with Maximo Application Suite, performing configuration validation.entitymgr-ws
watches Workspace.core.mas.ibm.com, manages Workspace creation in Maximo Application Suite.SAML users replacing local user login.
Unless explicitly defined, we should not allow a SAML user to login to MAS using a local user userid.
The scenario is:
You have SAML configured.
userA is a local user;
userA is also a SAML user (in the company IDP) but not part of MAS.
userB is a SAML user in MAS.
1- Customer goes to MAS login page and input userB username;
2- MAS will redirect the user to SAML;
3- Customer inputs credentials for userA instead of userB in the IDP login page;
4- SAML assertion will return nameID as userA, which in MAS the user is a local user only.
What should happen?
In the step 4, user should get a not-authorized message as it does not exists in MAS as SAML user.
Reference Link : https://www.ibm.com/mysupport/s/defect/aCI3p000000bm8C/dt196144?language=en_US
apiVersion: integreatly.org/v1alpha1
kind: Grafana
metadata:
name: mas-grafana
namespace: openshift-user-workload-monitoring
spec:
ingress:
enabled: true
dataStorage:
accessModes:
- ReadWriteOnce
size: 10Gi
class: ocs-storagecluster-cephfs
config:
log:
mode: "console"
level: "warn"
security:
admin_user: "root"
admin_password: "secret"
auth:
disable_login_form: False
disable_signout_menu: True
auth.anonymous:
enabled: True
dashboardLabelSelector:
- matchExpressions:
- {key: app, operator: In, values: [grafana]}
Config:
env:
- name: "DASHBOARD_NAMESPACES_ALL"
value: "true"
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
name: grafana-operator
namespace: "{{ grafana_namespace }}"
labels:
operators.coreos.com/grafana-operator.{{ grafana_namespace }}: ''
spec:
channel: v4
installPlanApproval: Automatic
name: grafana-operator
source: community-operators
sourceNamespace: openshift-marketplace
config:
env:
- name: "DASHBOARD_NAMESPACES_ALL"
value: "true"
oc adm policy add-cluster-role-to-user cluster-monitoring-view -z grafana-serviceaccount
- oc serviceaccounts get-token grafana-serviceaccount -n openshift-user-workload-monitoring
${BEARER_TOKEN}
value with the value that you obtained in a previous step.apiVersion: integreatly.org/v1alpha1
kind: GrafanaDataSource
metadata:
name: prometheus-grafanadatasource
namespace: openshift-user-workload-monitoring
spec:
datasources:
- access: proxy
editable: true
isDefault: true
jsonData:
httpHeaderName1: 'Authorization'
timeInterval: 5s
tlsSkipVerify: true
name: Prometheus
secureJsonData:
httpHeaderValue1: 'Bearer ${BEARER_TOKEN}'
type: prometheus
url: 'https://thanos-querier.openshift-monitoring.svc.cluster.local:9091'
name: prometheus-grafanadatasource.yaml
Problem On Windows system, when you select a task that requires a server restart in Administration Services UI, and run that task, the tas...