Problem Scenario: OKD cluster is having two cluster-admins: User1 and User2.
If User1 connects to cluster using ssh and performs oc login
and parallely User2 connects to the same cluster with new ssh session and performs oc login
.
Now when User1 checks oc whoami
the result will be User2
(which is desired to have User1
). This will create problems like User1 operations(ex:deployements) to clash with User2.
How can this problem be eliminated so that two users can parallelly use the cluster?
Note: Both User1 and User2 are configured with LDAP, is this creating problem?
How can this problem be eliminated so that two users can parallelly use the cluster?
AFAIK, the OKD session is saved in $HOME/.kube/config by default. So it depends on a OS account session. If you'd like to use at the same time, then you should use different OS account each other. OR you should run oc login --config context_file_path per each execution for saving session to different context file. Refer Loading and Merging Rules for more details.
Note: Both User1 and User2 are configured with LDAP, is this creating problem?
No. Identity provider configuration does not affect this.
You should not share user accounts in this way. Each person who is logging in to the cluster should using a command-line client be doing so under their own linux uid against their own home directory. Sharing user accounts is a security vulnerability and removes your ability to track who is doing what.
kubectl
and oc
take this as a prerequisite, which is why you're running into this issue.