7.8.4. Configuring the Required Services
# chkconfig httpd on# chkconfig network on# chkconfig ntpd on# chkconfig sshd on
# lokkit --nostart --service=ssh# lokkit --nostart --service=https# lokkit --nostart --service=http
ServerName in the Apache configuration on the broker:
# sed -i -e "s/ServerName .*\$/ServerName `hostname`/" \/etc/httpd/conf.d/000002_openshift_origin_broker_servername.conf
Note
enable_services_on_broker function performs these steps.
Generate a broker access key, which is used by Jenkins and other optional services. The access key is configured with the /etc/openshift/broker.conf file. This includes the expected key file locations, which are configured in the lines shown in the sample screen output. The following AUTH_PRIV_KEY_FILE and AUTH_PUB_KEY_FILE settings show the default values, which can be changed as required. The AUTH_PRIV_KEY_PASS setting can also be configured, but it is not required.
AUTH_PRIV_KEY_FILE="/etc/openshift/server_priv.pem" AUTH_PRIV_KEY_PASS="" AUTH_PUB_KEY_FILE="/etc/openshift/server_pub.pem"
Note
AUTH_PRIV_KEY_FILE, AUTH_PRIV_KEY_PASS and AUTH_PUB_KEY_FILE settings must specify the same private key on all associated brokers for the Jenkins authentication to work.
AUTH_PRIV_KEY_FILE or AUTH_PRIV_KEY_PASS settings, replace /etc/openshift/server_priv.pem or /etc/openshift/server_pub.pem in the following commands as necessary.
# openssl genrsa -out /etc/openshift/server_priv.pem 2048# openssl rsa -in /etc/openshift/server_priv.pem -pubout > /etc/openshift/server_pub.pem# chown apache:apache /etc/openshift/server_pub.pem# chmod 640 /etc/openshift/server_pub.pem
AUTH_SALT setting in the /etc/openshift/broker.conf file must also be set. It must be secret and set to the same value across all brokers in a cluster, or scaling and Jenkins integration will not work. Create the random string using:
# openssl rand -base64 64Important
AUTH_SALT is changed after the broker is running, the broker service must be restarted:
# service openshift-broker restartoo-admin-broker-auth tool to recreate the broker authentication keys. Run the following command to rekey authentication tokens for all applicable gears:
# oo-admin-broker-auth --rekey-all--help output and man page for additional options and more detailed use cases.
SESSION_SECRET setting in the /etc/openshift/broker.conf file to sign the Rails sessions. Ensure it is the same across all brokers in a cluster. Create the random string using:
# openssl rand -hex 64AUTH_SALT, if the SESSION_SECRET setting is changed after the broker is running, the broker service must be restarted. Note that all sessions are dropped when the broker service is restarted.
# ssh-keygen -t rsa -b 2048 -f ~/.ssh/rsync_id_rsa# cp ~/.ssh/rsync_id_rsa* /etc/openshift/
Note
configure_access_keys_on_broker function performs these steps.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.