$ oc get events -n openshift-authentication --sort-by='.metadata.creationTimestamp'
Implementing a robust cluster security profile is important for building resilient telco networks.
Determine which identity providers are in your cluster. For more information about supported identity providers, see "Supported identity providers" in Authentication and authorization.
After you know which providers are configured, you can inspect the openshift-authentication
namespace to determine if there are potential issues.
Check the events in the openshift-authentication
namespace by running the following command:
$ oc get events -n openshift-authentication --sort-by='.metadata.creationTimestamp'
Check the pods in the openshift-authentication
namespace by running the following command:
$ oc get pod -n openshift-authentication
Optional: If you need more information, check the logs of one of the running pods by running the following command:
$ oc logs -n openshift-authentication <pod_name>