$ oc extract secret/pull-secret -n openshift-config --to=.
You may choose to opt out of reporting health and usage data for your cluster.
To opt out of remote health reporting, you must:
Modify the global cluster pull secret to disable remote health reporting.
Update the cluster to use this modified pull secret.
In OKD, customers can opt out of reporting usage information. However, connected clusters allow Red Hat to react more quickly to problems and better support our customers, as well as better understand how product upgrades impact clusters. Connected clusters also help to simplify the subscription and entitlement process and enable the OpenShift Cluster Manager service to provide an overview of your clusters and their subscription status.
Red Hat strongly recommends leaving health and usage reporting enabled for pre-production and test clusters even if it is necessary to opt out for production clusters. This allows Red Hat to be a participant in qualifying OKD in your environments and react more rapidly to product issues.
Some of the consequences of opting out of having a connected cluster are:
Red Hat will not be able to monitor the success of product upgrades or the health of your clusters without a support case being opened.
Red Hat will not be able to use configuration data to better triage customer support cases and identify which configurations our customers find important.
The OpenShift Cluster Manager will not show data about your clusters including health and usage information.
In restricted networks, Telemetry and Insights data can still be reported through appropriate configuration of your proxy.
You can modify your existing global cluster pull secret to disable remote health reporting. This disables both Telemetry and the Insights Operator.
You have access to the cluster as a user with the cluster-admin
role.
Download the global cluster pull secret to your local file system.
$ oc extract secret/pull-secret -n openshift-config --to=.
In a text editor, edit the .dockerconfigjson
file that was downloaded.
Remove the cloud.openshift.com
JSON entry, for example:
"cloud.openshift.com":{"auth":"<hash>","email":"<email_address>"}
Save the file.
You can now update your cluster to use this modified pull secret.
You can update the global pull secret for your cluster by either replacing the current pull secret or appending a new pull secret.
The procedure is required when users use a separate registry to store images than the registry used during installation.
You have access to the cluster as a user with the cluster-admin
role.
Optional: To append a new pull secret to the existing pull secret, complete the following steps:
Enter the following command to download the pull secret:
$ oc get secret/pull-secret -n openshift-config --template='{{index .data ".dockerconfigjson" | base64decode}}' ><pull_secret_location> (1)
1 | Provide the path to the pull secret file. |
Enter the following command to add the new pull secret:
$ oc registry login --registry="<registry>" \ (1)
--auth-basic="<username>:<password>" \ (2)
--to=<pull_secret_location> (3)
1 | Provide the new registry. You can include multiple repositories within the same registry, for example: --registry="<registry/my-namespace/my-repository>" . |
2 | Provide the credentials of the new registry. |
3 | Provide the path to the pull secret file. |
Alternatively, you can perform a manual update to the pull secret file.
Enter the following command to update the global pull secret for your cluster:
$ oc set data secret/pull-secret -n openshift-config --from-file=.dockerconfigjson=<pull_secret_location> (1)
1 | Provide the path to the new pull secret file. |
This update is rolled out to all nodes, which can take some time depending on the size of your cluster.
As of OKD 4.7.4, changes to the global pull secret no longer trigger a node drain or reboot. |