Supports integrating deployed OpenShift clusters into the platform for unified management.
The Kubernetes version and parameters of the cluster must meet the Standard Kubernetes Cluster Requirements.
During integration, kubectl commands are required. Please install the CLI tool on the bastion host that can access the cluster.
To enable real-time monitoring of metrics such as nodes, workloads (Deployment, StatefulSet, DaemonSet), Pods, and containers, ensure Prometheus is already deployed in the target cluster.
To use the registry deployed by the platform during global cluster installation, run the following command on a global control node:
To use an external registry, manually set the REGISTRY variable:
Run the following command to check if the registry supports HTTPS and uses a trusted CA certificate:
If the check fails, follow the steps below.
Log in to all OCP cluster nodes.
On each node, configure the registry settings:
Restart crio:
Modify the CoreDNS ConfigMap in the global cluster to configure DNS.
From the bastion host, get the OCP cluster base domain:
Example output:
Log in to the platform management console, switch to the global cluster, then go to Cluster Management > Resource Management.
Edit the cpaas-coredns ConfigMap in the kube-system namespace.
Add a new block using the OCP base domain and DNS server address (from /etc/resolv.conf on a cluster node).
Example:
Choose one of the following:
On the bastion host, search for the kubeconfig file and verify it contains an admin context.
Copy the kubeconfig file from the bastion host to your local machine:
See How to fetch cluster information?.
In the left navigation, go to Cluster Management > Clusters.
Click Import Cluster.
Configure the parameters:
| Parameter | Description |
|---|---|
| Registry | Registry storing platform component images.Platform Default: registry configured during global setup.Private Registry: requires registry address, port, username, and password.Public Registry: requires updating cloud credentials. |
| Cluster Info | Either upload the KubeConfig file or enter manually.Cluster Address: API Server address.CA Certificate: decoded Base64 CA certificate.Authentication: token or client certificate with cluster-admin permissions. |
Click Check Connectivity.
If successful, click Import. Progress can be viewed in the execution log. Once imported, the cluster appears healthy in the list.
Ensure network connectivity between the global cluster and the imported cluster. See Network Configuration for Imported Clusters.
After successful integration, go to Marketplace to deploy required add-ons such as monitoring, log collection, and log storage.
Before deploying log collection, ensure /var/cpaas/ has more than 50GB free space:
You can modify the audit policy (spec.audit.profile) of the cluster:
Sensitive resources (e.g., Secrets, Routes, OAuthClient) only log metadata.
Update with:
Adding nodes via the platform UI is not supported. Use the vendor's method.