Skip to content

Commit 7c3453c

Browse files
committed
deploy: 8c7ad07
1 parent 969dd13 commit 7c3453c

File tree

286 files changed

+4317
-865
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

286 files changed

+4317
-865
lines changed

blog/2021-12-31-medical-diagnosis/index.html

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -397,8 +397,8 @@
397397
To customize the default configuration, you must have a GitHub account and a token with repositories permissions, to read from and write to your forks.
398398
Access to Podman (or Docker) for execution of the container images used by pattern.sh script for provisioning.
399399
Fulfill the general prerequisites for Validated Patterns.
400-
Depending on the characteristics of your cluster, you might need additional hardware resources for the Advanced Cluster Management (ACM) component. For a single-node cluster, you can start with 4 vCPUs, 16 GB of memory, and 120 GB of storage.
401-
For more details about ACM sizing, see Sizing your cluster.
400+
Depending on the characteristics of your cluster, you might need additional hardware resources for the Red Hat Advanced Cluster Management (RHACM) component. For a single-node cluster, you can start with 4 vCPUs, 16 GB of memory, and 120 GB of storage.
401+
For more details about RHACM sizing, see Sizing your cluster.
402402
(Optional) The Helm binary, for instructions, see Installing Helm.
403403
The Layered Zero Trust pattern’s default deployment assumes that none of its components have been installed previously. Verify that your OpenShift Container Platform environment does not already contain any of the listed components before proceeding.
404404
Repository setup Follow these instructions for setting up the project repository:
@@ -408,7 +408,8 @@
408408
$ cd </path_to_your_repository> Set up upstream remote repository:
409409
$ git remote add -f upstream [email protected]/validatedpatterns/layered-zero-trust.git Verify the setup of your remote repositories by running the following command:
410410
$ git remote -v Example output:
411-
origin [email protected]:<your_username>/layered-zero-trust.git (fetch) origin [email protected]:<your_username>/layered-zero-trust.git (push) upstream https://github.com/validatedpatterns/layered-zero-trust.git (fetch) upstream https://github.com/validatedpatterns/layered-zero-trust.git (push) Create a local copy of the secret values file that can safely include credentials. Run the following command:
411+
origin [email protected]:<your_username>/layered-zero-trust.git (fetch) origin [email protected]:<your_username>/layered-zero-trust.git (push) upstream https://github.com/validatedpatterns/layered-zero-trust.git (fetch) upstream https://github.com/validatedpatterns/layered-zero-trust.git (push) The Layered Zero Trust pattern’s default deployment assumes that none of its components have been installed previously. Verify that your OpenShift Container Platform environment does not already contain any of the listed components before proceeding.
412+
Create a local copy of the secret values file that can safely include credentials. Run the following command:
412413
$ cp values-secret.yaml.template ~/values-secret-layered-zero-trust.yaml To prevent pushing secrets to your Git repository, the command places the values-secret.yaml file in your home directory. You derive this file from the values-secrets.yaml.template file located in the pattern’s top-level directory. When you create new patterns, add your secrets to the values-secret.yaml file in your home directory.
413414
Create a new feature branch, for example my-branch from the main branch for your content:
414415
$ git checkout -b my-branch main (Optional) To customize the execution of the pattern, optionally change the Helm values files and then commit the changes.
@@ -430,6 +431,14 @@
430431
Cluster Argo CD: Deploys an App-of-Apps application named layered-zero-trust-hub. This application installs the pattern’s components.
431432
Hub Argo CD: Manages Cluster Argo CD instance and the individual components that belong to the pattern on the hub OpenShift Container Platform instance.
432433
If every Argo CD application reports a Healthy status, the pattern has been deployed successfully.
434+
Importing existing clusters The pattern supports importing pre-existing OpenShift Container Platform clusters into the Hub cluster, converting them into Managed Clusters.
435+
Do not use the ClusterPools configuration settings for RHACM chart provisioning. The ClusterPools technology is limited to cloud environments.
436+
Instead, use the acm-managed-clusters chart to import your existing standalone clusters.
437+
Procedure Copy the kubeconfig file of the cluster you want to import to your local system.
438+
In the values-secret.yaml file, define the kubeconfig secret by providing the local file system path to the kubeconfig file you copied in Step 1.
439+
- name: kubeconfig-spoke vaultPrefixes: - hub fields: - name: content path: ~/.kube/kubeconfig-ztvp-spoke In the values-hub.yaml file, add a new entry in the clusterGroup.managedClusterGroups key.
440+
managedClusterGroups: exampleRegion: name: group-one acmlabels: - name: clusterGroup value: group-one helmOverrides: - name: clusterGroup.isHubCluster value: false Also in the values-hub.yaml file, add your cluster definition in the acmManagedClusters.clusters key.
441+
acmManagedClusters: clusters: - name: ztvp-spoke-1 clusterGroup: group-one labels: cloud: auto-detect vendor: auto-detect kubeconfigVaultPath: secret/data/hub/kubeconfig-spoke Deploy the pattern.
433442
`,url:"https://validatedpatterns.io/patterns/layered-zero-trust/lzt-getting-started/",breadcrumb:"/patterns/layered-zero-trust/lzt-getting-started/"},"https://validatedpatterns.io/patterns/mlops-fraud-detection/mfd-getting-started/":{title:"Getting started",tags:[],content:` Deploying the MLOps Fraud Detection pattern Prerequisites An OpenShift cluster (Go to the OpenShift console). Cluster must have a dynamic StorageClass to provision PersistentVolumes.
434443
A GitHub account (and a token for it with repositories permissions, to read from and write to your forks)
435444
For installation tooling dependencies, see Patterns quick start.
@@ -4788,6 +4797,8 @@
47884797
Stores sensitive assets securely.
47894798
External Secrets Operator (ESO)
47904799
Synchronizes secrets stored in HashiCorp Vault with OpenShift Container Platform.
4800+
Red Hat Advanced Cluster Management (RHACM)
4801+
Provides a management control plane in multi-cluster scenarios.
47914802
Sidecar pattern The sidecar pattern is a deployment model where a separate container or process, known as a sidecar, runs alongside the main application to handle auxiliary tasks. In an OpenShift Container Platform environment, pods simplify this by ensuring the sidecar and main application share the same lifecycle. This approach benefits Zero Trust architectures by enabling centralized enforcement of security policies such as authentication, authorization, traffic encryption (mTLS), rate limiting, auditing, and logging, without requiring developers to add this logic to every microservice. It separates concerns, simplifies development, and allows security policies to be updated independently of the main application.
47924803
While sidecars are often criticized for adding complexity and resource usage, these are often misconceptions:
47934804
Complexity: Sidecars simplify the main application by offloading tasks, and modern platforms, such as OpenShift Container Platform, are designed to manage them efficiently.
@@ -4800,6 +4811,7 @@
48004811
Red Hat build of Keycloak: Manages identity and access for users and services.
48014812
Red Hat OpenShift GitOps: A GitOps continuous delivery (CD) solution based on ArgoCD
48024813
OpenShift Cert Manager: Manages the lifecycle of certificates for secure communication.
4814+
RHACM: Provides management capabilities in multi-cluster scenarios.
48034815
External Secrets Operator: Synchronizes secrets from external systems into the cluster.
48044816
Compliance Operator: Provides ability to scan and remediate cluster hardening based on profiles
48054817
QTodo application: Serves as a sample Quarkus-based application to show zero trust principles.

blog/2022-03-23-acm-mustonlyhave/index.html

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -467,8 +467,8 @@
467467
To customize the default configuration, you must have a GitHub account and a token with repositories permissions, to read from and write to your forks.
468468
Access to Podman (or Docker) for execution of the container images used by pattern.sh script for provisioning.
469469
Fulfill the general prerequisites for Validated Patterns.
470-
Depending on the characteristics of your cluster, you might need additional hardware resources for the Advanced Cluster Management (ACM) component. For a single-node cluster, you can start with 4 vCPUs, 16 GB of memory, and 120 GB of storage.
471-
For more details about ACM sizing, see Sizing your cluster.
470+
Depending on the characteristics of your cluster, you might need additional hardware resources for the Red Hat Advanced Cluster Management (RHACM) component. For a single-node cluster, you can start with 4 vCPUs, 16 GB of memory, and 120 GB of storage.
471+
For more details about RHACM sizing, see Sizing your cluster.
472472
(Optional) The Helm binary, for instructions, see Installing Helm.
473473
The Layered Zero Trust pattern’s default deployment assumes that none of its components have been installed previously. Verify that your OpenShift Container Platform environment does not already contain any of the listed components before proceeding.
474474
Repository setup Follow these instructions for setting up the project repository:
@@ -478,7 +478,8 @@
478478
$ cd </path_to_your_repository> Set up upstream remote repository:
479479
$ git remote add -f upstream [email protected]/validatedpatterns/layered-zero-trust.git Verify the setup of your remote repositories by running the following command:
480480
$ git remote -v Example output:
481-
origin [email protected]:<your_username>/layered-zero-trust.git (fetch) origin [email protected]:<your_username>/layered-zero-trust.git (push) upstream https://github.com/validatedpatterns/layered-zero-trust.git (fetch) upstream https://github.com/validatedpatterns/layered-zero-trust.git (push) Create a local copy of the secret values file that can safely include credentials. Run the following command:
481+
origin [email protected]:<your_username>/layered-zero-trust.git (fetch) origin [email protected]:<your_username>/layered-zero-trust.git (push) upstream https://github.com/validatedpatterns/layered-zero-trust.git (fetch) upstream https://github.com/validatedpatterns/layered-zero-trust.git (push) The Layered Zero Trust pattern’s default deployment assumes that none of its components have been installed previously. Verify that your OpenShift Container Platform environment does not already contain any of the listed components before proceeding.
482+
Create a local copy of the secret values file that can safely include credentials. Run the following command:
482483
$ cp values-secret.yaml.template ~/values-secret-layered-zero-trust.yaml To prevent pushing secrets to your Git repository, the command places the values-secret.yaml file in your home directory. You derive this file from the values-secrets.yaml.template file located in the pattern’s top-level directory. When you create new patterns, add your secrets to the values-secret.yaml file in your home directory.
483484
Create a new feature branch, for example my-branch from the main branch for your content:
484485
$ git checkout -b my-branch main (Optional) To customize the execution of the pattern, optionally change the Helm values files and then commit the changes.
@@ -500,6 +501,14 @@
500501
Cluster Argo CD: Deploys an App-of-Apps application named layered-zero-trust-hub. This application installs the pattern’s components.
501502
Hub Argo CD: Manages Cluster Argo CD instance and the individual components that belong to the pattern on the hub OpenShift Container Platform instance.
502503
If every Argo CD application reports a Healthy status, the pattern has been deployed successfully.
504+
Importing existing clusters The pattern supports importing pre-existing OpenShift Container Platform clusters into the Hub cluster, converting them into Managed Clusters.
505+
Do not use the ClusterPools configuration settings for RHACM chart provisioning. The ClusterPools technology is limited to cloud environments.
506+
Instead, use the acm-managed-clusters chart to import your existing standalone clusters.
507+
Procedure Copy the kubeconfig file of the cluster you want to import to your local system.
508+
In the values-secret.yaml file, define the kubeconfig secret by providing the local file system path to the kubeconfig file you copied in Step 1.
509+
- name: kubeconfig-spoke vaultPrefixes: - hub fields: - name: content path: ~/.kube/kubeconfig-ztvp-spoke In the values-hub.yaml file, add a new entry in the clusterGroup.managedClusterGroups key.
510+
managedClusterGroups: exampleRegion: name: group-one acmlabels: - name: clusterGroup value: group-one helmOverrides: - name: clusterGroup.isHubCluster value: false Also in the values-hub.yaml file, add your cluster definition in the acmManagedClusters.clusters key.
511+
acmManagedClusters: clusters: - name: ztvp-spoke-1 clusterGroup: group-one labels: cloud: auto-detect vendor: auto-detect kubeconfigVaultPath: secret/data/hub/kubeconfig-spoke Deploy the pattern.
503512
`,url:"https://validatedpatterns.io/patterns/layered-zero-trust/lzt-getting-started/",breadcrumb:"/patterns/layered-zero-trust/lzt-getting-started/"},"https://validatedpatterns.io/patterns/mlops-fraud-detection/mfd-getting-started/":{title:"Getting started",tags:[],content:` Deploying the MLOps Fraud Detection pattern Prerequisites An OpenShift cluster (Go to the OpenShift console). Cluster must have a dynamic StorageClass to provision PersistentVolumes.
504513
A GitHub account (and a token for it with repositories permissions, to read from and write to your forks)
505514
For installation tooling dependencies, see Patterns quick start.
@@ -4858,6 +4867,8 @@
48584867
Stores sensitive assets securely.
48594868
External Secrets Operator (ESO)
48604869
Synchronizes secrets stored in HashiCorp Vault with OpenShift Container Platform.
4870+
Red Hat Advanced Cluster Management (RHACM)
4871+
Provides a management control plane in multi-cluster scenarios.
48614872
Sidecar pattern The sidecar pattern is a deployment model where a separate container or process, known as a sidecar, runs alongside the main application to handle auxiliary tasks. In an OpenShift Container Platform environment, pods simplify this by ensuring the sidecar and main application share the same lifecycle. This approach benefits Zero Trust architectures by enabling centralized enforcement of security policies such as authentication, authorization, traffic encryption (mTLS), rate limiting, auditing, and logging, without requiring developers to add this logic to every microservice. It separates concerns, simplifies development, and allows security policies to be updated independently of the main application.
48624873
While sidecars are often criticized for adding complexity and resource usage, these are often misconceptions:
48634874
Complexity: Sidecars simplify the main application by offloading tasks, and modern platforms, such as OpenShift Container Platform, are designed to manage them efficiently.
@@ -4870,6 +4881,7 @@
48704881
Red Hat build of Keycloak: Manages identity and access for users and services.
48714882
Red Hat OpenShift GitOps: A GitOps continuous delivery (CD) solution based on ArgoCD
48724883
OpenShift Cert Manager: Manages the lifecycle of certificates for secure communication.
4884+
RHACM: Provides management capabilities in multi-cluster scenarios.
48734885
External Secrets Operator: Synchronizes secrets from external systems into the cluster.
48744886
Compliance Operator: Provides ability to scan and remediate cluster hardening based on profiles
48754887
QTodo application: Serves as a sample Quarkus-based application to show zero trust principles.

0 commit comments

Comments
 (0)