Generate a dynamic list of the exposed services on the 3scale Developer Portal.
Replace your built-in "Documentation" page (/docs
) in the 3scale CMS with the attached content.
#!groovy | |
// Define Maven Command. Make sure it points to the correct settings for our | |
// Nexus installation. The file nexus_openshift_settings.xml needs to be in the | |
// Source Code repository. | |
def mvn = "mvn -s ./nexus_openshift_settings.xml" | |
def sonarqube = "http://sonarqube-cicd.app.openshift.test/" | |
def nexusRepo = "openshift-task" | |
def nexusUrl = "http://nexus3-cicd.app.openshift.test/repository/${nexusRepo}/" | |
def credentialsId = "749214e0-4aa1-444b-8b17-599bfa084e3f" |
#!/bin/bash | |
# Send stats to this file | |
exec 23>> stats.csv | |
while sleep 30; do | |
date="$(date -Iseconds)" | |
real="" | |
user="" | |
sys="" |
#!/bin/sh | |
# Your Initial Access Token | |
ACCESS_TOKEN="" | |
# The RH-SSO Realm | |
REALM="3scale" | |
# The Hostname of the Secure Route of RH-SSO | |
SSO_HOST="" |
{ | |
"variables": [], | |
"info": { | |
"name": "3scale - OAuth", | |
"_postman_id": "5cf7becf-4726-97b7-3f19-142c926ec3a3", | |
"description": "", | |
"schema": "https://schema.getpostman.com/json/collection/v2.0.0/collection.json" | |
}, | |
"item": [ | |
{ |
#!/bin/bash | |
APICAST_HOSTNAME="" | |
CLIENT_ID="" | |
CLIENT_SECRET="" | |
SCOPE="test" | |
REDIRECT_URI="https://www.getpostman.com/oauth2/callback" | |
echo |
#!/bin/bash | |
IMAGES="jboss-eap-7/eap70-openshift openshift3/jenkins-2-rhel7 openshift3/jenkins-slave-maven-rhel7 openshift3/jenkins-slave-nodejs-rhel7 dotnet/dotnet-20-jenkins-slave-rhel7 openshift3/jenkins-slave-base-rhel7 rhscl/mongodb-34-rhel7 rhscl/mysql-57-rhel7 rhscl/mariadb-102-rhel7 rhscl/postgresql-96-rhel7 rhscl/nodejs-6-rhel7 rhscl/s2i-base-rhel7 openshift3/apb-base rhel7-atomic rhel7 rhscl/ruby-24-rhel7 rhscl/perl-524-rhel7 rhscl/python-27-rhel7 rhscl/python-36-rhel7 redhat-sso-7/sso71-openshift" | |
for i in $IMAGES; do | |
file="$(echo $i|tr '/' '_').tar" | |
if [ ! -f "$file" -a ! -f "$file.gz" ]; then | |
echo "Fetching $i... into $file..." | |
skopeo copy docker://registry.access.redhat.com/$i:latest docker-archive://$PWD/$file:$i:latest | |
fi |
--- | |
- name: Fetch OpenShift Images | |
hosts: localhost | |
become: yes | |
gather_facts: no | |
vars: | |
openshift_base_image: openshift3/ose | |
redhat_registry: registry.access.redhat.com | |
openshift_images: | |
- openshift3/ose-ansible |
Lets say that you deployed an application in OpenShift and the application is not working. You would like to debug but the application does not embed any troubleshooting tool (for instance, an Alpine Linux or a scratch image)
You could download one of the static tools available there
When re-deploying certificates using the redeploy-certificates.yml
,
the OpenShift Service Signer CA is re-generated, thus invalidating all
the previously generated certificates.
The first symptom is usually the Web Console not working anymore (502 HTTP Status Code).