Este contenido no está disponible en el idioma seleccionado.
Chapter 5. Connecting to AMQ Management Console for an Operator-based broker deployment
Each broker Pod in an Operator-based deployment hosts its own instance of AMQ Management Console at port 8161.
The following procedures describe how to connect to AMQ Management Console for a deployed broker.
Prerequisites
- You created a broker deployment using the AMQ Broker Operator. For example, to learn how to use a sample CR to create a basic broker deployment, see Section 3.4.1, “Deploying a basic broker instance”.
- You enabled access to AMQ Management Console for the brokers in your deployment. For more information about enabling access to AMQ Management Console, see Section 4.6, “Enabling access to AMQ Management Console”.
5.1. Connecting to AMQ Management Console
When you enable access to AMQ Management Console in the Custom Resource (CR) instance for your broker deployment, the Operator automatically creates a dedicated Service and Route for each broker Pod to provide access to AMQ Management Console.
The default name of the automatically-created Service is in the form <custom-resource-name>-wconsj-<broker-pod-ordinal>-svc
. For example, my-broker-deployment-wconsj-0-svc
. The default name of the automatically-created Route is in the form <custom-resource-name>-wconsj-<broker-pod-ordinal>-svc-rte
. For example, my-broker-deployment-wconsj-0-svc-rte
.
This procedure shows you how to access the console for a running broker Pod.
Procedure
In the OpenShift Container Platform web console, click
. On the Routes page, identify the
wconsj
Route for the given broker Pod. For example,my-broker-deployment-wconsj-0-svc-rte
.Under Location, click the link that corresponds to the Route.
A new tab opens in your web browser.
Click the Management Console link.
The AMQ Management Console login page opens.
NoteCredentials are required to log in to AMQ Management Console only if the
requireLogin
property of the CR is set totrue
. This property specifies whether login credentials are required to log in to the broker and AMQ Management Console. By default, therequireLogin
property is set tofalse
. IfrequireLogin
is set tofalse
, you can log in to AMQ Management Console without supplying a valid username and password by entering any text when prompted for a username and password.If the
requireLogin
property is set totrue
, enter a username and password.You can enter the credentials for a preconfigured user that is available for connecting to the broker and AMQ Management Console. You can find these credentials in the
adminUser
andadminPassword
properties if these properties are configured in the Custom Resource (CR) instance. It these properties are not configured in the CR, the Operator automatically generates the credentials. To obtain the automatically generated credentials, see Section 5.2, “Accessing AMQ Management Console login credentials”.If you want to log in as any other user, note that a user must belong to a security role specified for the
hawtio.role
system property to have the permissions required to log in to AMQ Management Console. The default role for thehawtio.role
system property isadmin
, which the preconfigured user belongs to.
5.2. Accessing AMQ Management Console login credentials
If you do not specify a value for adminUser
and adminPassword
in the Custom Resource (CR) instance used for your broker deployment, the Operator automatically generates these credentials and stores them in a secret. The default secret name is in the form <custom-resource-name>-credentials-secret
, for example, my-broker-deployment-credentials-secret
.
Values for adminUser
and adminPassword
are required to log in to the management console only if the requireLogin
parameter of the CR is set to true
.
If requireLogin
is set to false
, you can log in to the console without supplying a valid username password by entering any text when prompted for username and password.
This procedure shows how to access the login credentials.
Procedure
See the complete list of secrets in your OpenShift project.
-
From the OpenShift Container Platform web console, click
. From the command line:
$ oc get secrets
-
From the OpenShift Container Platform web console, click
Open the appropriate secret to reveal the Base64-encoded console login credentials.
- From the OpenShift Container Platform web console, click the secret that includes your broker Custom Resource instance in its name. Click the YAML tab.
From the command line:
$ oc edit secret <my-broker-deployment-credentials-secret>
To decode a value in the secret, use a command such as the following:
$ echo 'dXNlcl9uYW1l' | base64 --decode console_admin
Additional resources
- To learn more about using AMQ Management Console to view and manage brokers, see Managing brokers using AMQ Management Console in Managing AMQ Broker.