cancel
Showing results for 
Search instead for 
Did you mean: 
Moderator
Moderator
  • 193 Views

Developers Blog: Troubleshooting Red Hat OpenShift applications with throwaway containers

Shameless advertising: I have a new blog post on Red Hat Developers: "Troubleshooting Red Hat OpenShift applications with throwaway containers" https://developers.redhat.com/blog/2019/08/22/troubleshooting-red-hat-openshift-applications-with-th...

Labels (2)
2 Replies
joelbirchler Mission Specialist
Mission Specialist
  • 175 Views

Re: Developers Blog: Troubleshooting Red Hat OpenShift applications with throwaway containers

This is a terrific approach and a safer alternative to the traditional ssh or exec debugging tactics.

0 Kudos
Reply
Loading...
Moderator
Moderator
  • 173 Views

Re: Developers Blog: Troubleshooting Red Hat OpenShift applications with throwaway containers

Hi @joelbirchler ,

Even more than you think: OpenShift 4 also provides the 'oc debug node' command, that creates a privileged container in a host of your choice, with the explicit intent to avoid the need to SSH into a worker or master node.

Of course this ability is restricted to cluster admins, but it allows you to perform operations such as looking at the real configuration files that Ignitionand MachineOperators created on your CoreOS nodes, managing systemd units, and using te crictl command to work with the CRI-O container engine in a low-level.

Your cluster nodes are not required to have public IP addresses (and they usually don't) because 'oc debug node' uses the same network path the oc comand uses to connect to the OpenShift API, and them the master nodes tunnel transparently to worker nodes.

This feature was left out of the post because it is sysadmin/cluster admin stuff, not application developer stuff

Reply
Loading...
Join the discussion
You must log in to join this conversation.