This documentation is for a release that is no longer maintained
See documentation for the latest supported version 3 or the latest supported version 4.Chapter 6. Customizing the web console in OpenShift Container Platform
You can customize the OpenShift Container Platform web console to set a custom logo, product name, links, notifications, and command line downloads. This is especially helpful if you need to tailor the web console to meet specific corporate or government requirements.
6.1. Adding a custom logo and product name
You can create custom branding by adding a custom logo or custom product name. You can set both or one without the other, as these settings are independent of each other.
Prerequisites
- You must have administrator privileges.
- 
						Create a file of the logo that you want to use. The logo can be a file in any common image format, including GIF, JPG, PNG, or SVG, and is constrained to a max-heightof60px.
Procedure
- Import your logo file into a config map in the - openshift-confignamespace:- oc create configmap console-custom-logo --from-file /path/to/console-custom-logo.png -n openshift-config - $ oc create configmap console-custom-logo --from-file /path/to/console-custom-logo.png -n openshift-config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow Tip- You can alternatively apply the following YAML to create the config map: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Provide a valid base64-encoded logo.
 
- Edit the web console’s Operator configuration to include - customLogoFileand- customProductName:- oc edit consoles.operator.openshift.io cluster - $ oc edit consoles.operator.openshift.io cluster- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Once the Operator configuration is updated, it will sync the custom logo config map into the console namespace, mount it to the console pod, and redeploy. 
- Check for success. If there are any issues, the console cluster Operator will report a - Degradedstatus, and the console Operator configuration will also report a- CustomLogoDegradedstatus, but with reasons like- KeyOrFilenameInvalidor- NoImageProvided.- To check the - clusteroperator, run:- oc get clusteroperator console -o yaml - $ oc get clusteroperator console -o yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - To check the console Operator configuration, run: - oc get consoles.operator.openshift.io -o yaml - $ oc get consoles.operator.openshift.io -o yaml- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.2. Creating custom links in the web console
Prerequisites
- You must have administrator privileges.
Procedure
- 
						From Administration Custom Resource Definitions, click on ConsoleLink. 
- Select Instances tab
- Click Create Console Link and edit the file: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Valid location settings areHelpMenu,UserMenu,ApplicationMenu, andNamespaceDashboard.
 - To make the custom link appear in all namespaces, follow this example: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - To make the custom link appear in only some namespaces, follow this example: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - To make the custom link appear in the application menu, follow this example: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Click Save to apply your changes.
6.3. Customizing console routes
				For console and downloads routes, custom routes functionality uses the ingress config route configuration API. If the console custom route is set up in both the ingress config and console-operator config, then the new ingress config custom route configuration takes precedent. The route configuration with the console-operator config is deprecated.
			
6.3.1. Customizing the console route
					You can customize the console route by setting the custom hostname and TLS certificate in the spec.componentRoutes field of the cluster Ingress configuration.
				
Prerequisites
- You have logged in to the cluster as a user with administrative privileges.
- You have created a secret in the - openshift-confignamespace containing the TLS certificate and key. This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.Tip- You can create a TLS secret by using the - oc create secret tlscommand.
Procedure
- Edit the cluster - Ingressconfiguration:- oc edit ingress.config.openshift.io cluster - $ oc edit ingress.config.openshift.io cluster- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Set the custom hostname and optionally the serving certificate and key: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Save the file to apply the changes.
6.3.2. Customizing the download route
					You can customize the download route by setting the custom hostname and TLS certificate in the spec.componentRoutes field of the cluster Ingress configuration.
				
Prerequisites
- You have logged in to the cluster as a user with administrative privileges.
- You have created a secret in the - openshift-confignamespace containing the TLS certificate and key. This is required if the domain for the custom hostname suffix does not match the cluster domain suffix. The secret is optional if the suffix matches.Tip- You can create a TLS secret by using the - oc create secret tlscommand.
Procedure
- Edit the cluster - Ingressconfiguration:- oc edit ingress.config.openshift.io cluster - $ oc edit ingress.config.openshift.io cluster- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Set the custom hostname and optionally the serving certificate and key: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Save the file to apply the changes.
6.4. Customizing the login page
Create Terms of Service information with custom login pages. Custom login pages can also be helpful if you use a third-party login provider, such as GitHub or Google, to show users a branded page that they trust and expect before being redirected to the authentication provider. You can also render custom error pages during the authentication process.
Customizing the error template is limited to identity providers (IDPs) that use redirects, such as request header and OIDC-based IDPs. It does not have an effect on IDPs that use direct password authentication, such as LDAP and htpasswd.
Prerequisites
- You must have administrator privileges.
Procedure
- Run the following commands to create templates you can modify: - oc adm create-login-template > login.html - $ oc adm create-login-template > login.html- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - oc adm create-provider-selection-template > providers.html - $ oc adm create-provider-selection-template > providers.html- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - oc adm create-error-template > errors.html - $ oc adm create-error-template > errors.html- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Create the secrets: - oc create secret generic login-template --from-file=login.html -n openshift-config - $ oc create secret generic login-template --from-file=login.html -n openshift-config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - oc create secret generic providers-template --from-file=providers.html -n openshift-config - $ oc create secret generic providers-template --from-file=providers.html -n openshift-config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - oc create secret generic error-template --from-file=errors.html -n openshift-config - $ oc create secret generic error-template --from-file=errors.html -n openshift-config- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Run: - oc edit oauths cluster - $ oc edit oauths cluster- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Update the specification: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Run - oc explain oauths.spec.templatesto understand the options.
6.5. Defining a template for an external log link
If you are connected to a service that helps you browse your logs, but you need to generate URLs in a particular way, then you can define a template for your link.
Prerequisites
- You must have administrator privileges.
Procedure
- 
						From Administration Custom Resource Definitions, click on ConsoleExternalLogLink. 
- Select Instances tab
- Click Create Console External Log Link and edit the file: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
6.6. Creating custom notification banners
Prerequisites
- You must have administrator privileges.
Procedure
- 
						From Administration Custom Resource Definitions, click on ConsoleNotification. 
- Select Instances tab
- Click Create Console Notification and edit the file: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - 1
- Valid location settings areBannerTop,BannerBottom, andBannerTopBottom.
 
- Click Create to apply your changes.
6.7. Customizing CLI downloads
You can configure links for downloading the CLI with custom link text and URLs, which can point directly to file packages or to an external page that provides the packages.
Prerequisites
- You must have administrator privileges.
Procedure
- 
						Navigate to Administration Custom Resource Definitions. 
- Select ConsoleCLIDownload from the list of Custom Resource Definitions (CRDs).
- Click the YAML tab, and then make your edits: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Click the Save button.
6.8. Adding YAML examples to Kubernetes resources
You can dynamically add YAML examples to any Kubernetes resources at any time.
Prerequisites
- You must have cluster administrator privileges.
Procedure
- 
						From Administration Custom Resource Definitions, click on ConsoleYAMLSample. 
- Click YAML and edit the file: - Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Use - spec.snippetto indicate that the YAML sample is not the full YAML resource definition, but a fragment that can be inserted into the existing YAML document at the user’s cursor.
- Click Save.