Adapting Containers to Run on Red Hat OpenShift

Dynamic plugins allow you to extend the Red Hat OpenShift UI at runtime, adding custom pages and other extensions. They are based on the webpack module federation. Plugins are registered with the console using the ConsolePlugin custom resource and enabled in the console operator config by a cluster administrator.

Prerequisites

Getting started

To clone console plugin template repo, you should update the plugin metadata, such as the plugin name in the ConsolePlugin declaration of package.json.

"consolePlugin": {
  "name": "plugin-name",
  "version": "0.0.1",
  "displayName": "Dynamic Plugin",
  "description": "OpenShift console dynamic plugin",
  "exposedModules": {
    "ExamplePage": "./components/ExamplePage"
  },
  "dependencies": {
    "@console/pluginAPI": "*"
  }
}

The template adds a single example page in the home navigation section. The extension is in the console-extensions.json file and the react component is declared in: src/components/ExamplePage.tsx.

You can run the plugin using a local development environment or build an image to deploy it to a cluster.

There are two ways for development.

Development option 1: Local

In the terminal window, run the following commands:

  • yarn install
  • yarn run start

In another terminal window, run these commands:

This will run the OpenShift console in a container connected to the cluster you logged into. The plugin HTTP server runs on port 9001 with CORS enabled. Navigate to http://localhost:9000/example to see the running plugin.

Running start-console with Apple silicon and Podman

If you are using podman on a Mac with Apple silicon, yarn run start-console might fail since it runs an amd64 image. You can workaround the problem with qemu-user-static by running these commands:

podman machine ssh
sudo -i
rpm-ostree install qemu-user-static
systemctl reboot

Note: If you are facing issues related to tls while oc loggedIn, skip tls by adding below flag --insecure-skip-tls-verify=true with oc loggedIn command.

oc login -u kubeadmin -p <password> --insecure-skip-tls-verify=true

Development option 2: Docker and VSCode remote containers

Make sure the remote containers extension is installed. This method uses Docker Compose where one container is the OpenShift console and the second container is the plugin. It requires that you have access to an existing OpenShift cluster. After the initial build, the cached containers will help you start developing in seconds.

  • Create a dev.env file inside the .devcontainer folder with the correct values for your cluster:
OC_PLUGIN_NAME=my-plugin
OC_URL=https://api.example.com:6443
OC_USER=kubeadmin
OC_PASS=<password>
  • (Ctrl+Shift+P) => Remote Containers: Open Folder in Container...
  • yarn run start
  • Navigate to: http://localhost:9000/example

Build the docker image

You can deploy your plugin on a cluster. You must build an image and push it to an image registry. Create an account for Red Hat Quay.io.

  • Build the image:

docker build -t quay.io/my-repositroy/my-plugin:latest.

  • Run the image:

docker run -it --rm -d -p 9001:80 quay.io/my-repository/my-plugin:latest

  • Push the image:

docker push quay.io/my-repository/my-plugin:latest

Note: If you have a Mac with Apple silicon, you will need to add the flag --platform=linux/amd64 when building the image to target the correct platform to run in-cluster.

Deployment on the cluster

Download the yaml template file and update plugin name PLUGIN_NAME , namespace NAMESPACE, docker image IMAGE etc.

You can deploy the plugin to a cluster by applying template.yaml.

oc apply -f template.yaml

Once deployed, patch the console operator config to enable the plugin.

oc patch consoles.operator.openshift.io cluster --patch '{ "spec": { "plugins": ["plugin-name"] } }' --type=merge

Deployment by Helm chart

A Helm chart is available to deploy the plugin to an OpenShift environment.

The following Helm parameters are required:

plugin.image: The location of the image containing the plugin that was previously pushed.

Additional parameters can be specified if desired. Consult the chart values file for the full set of supported parameters.

Installing the Helm chart

Install the chart using the name of the plugin as the Helm release name into a new namespace or an existing namespace as specified by the my-plugin-namespace parameter and providing the location of the image within the plugin.image parameter by using the following command:

helm upgrade -i  my-plugin charts/openshift-console-plugin -n my-plugin-namespace --create-namespace --set plugin.image=my-plugin-image-location

Note: When deploying on OpenShift 4.10, it is recommended to add the parameter --set plugin.securityContext.enabled=false which will omit configurations related to pod security.

Learn more about the OpenShift console plugin

This article guided you through getting started in the dynamic plugin for Red Hat OpenShift. For more information, refer to the Console Plugin SDK README and ActiveMQ Artemis Self Provisioning Plugin.

Last updated: September 19, 2023