You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Whenever you need to change access from operator admin to [email protected] prefer to re-login by clearing the ~/.kube/cache/oidc-login cache instead of impersonation [email protected].
Can login as application developer [email protected] via Dex with static user
Can list access
kubectl -n "${NAMESPACE}" auth can-i --list
Can delegate admin access
$ kubectl -n "${NAMESPACE}" edit rolebinding extra-workload-admins # Add some subject subjects: # You can specify more than one "subject" - kind: User name: jane # "name" is case sensitive apiGroup: rbac.authorization.k8s.io
Can delegate view access
$ kubectl edit clusterrolebinding extra-user-view # Add some subject subjects: # You can specify more than one "subject" - kind: User name: jane # "name" is case sensitive apiGroup: rbac.authorization.k8s.io
Can login as application developer [email protected] via Dex with static user
Can list access
kubectl -n "${NAMESPACE}" auth can-i --list
Can delegate admin access
$ kubectl -n "${NAMESPACE}" edit rolebinding extra-workload-admins # Add some subject subjects: # You can specify more than one "subject" - kind: User name: jane # "name" is case sensitive apiGroup: rbac.authorization.k8s.io
Can delegate view access
$ kubectl edit clusterrolebinding extra-user-view # Add some subject subjects: # You can specify more than one "subject" - kind: User name: jane # "name" is case sensitive apiGroup: rbac.authorization.k8s.io
Overview
Note
Whenever you need to change access from operator admin to
[email protected]
prefer to re-login by clearing the~/.kube/cache/oidc-login
cache instead of impersonation[email protected]
.# Pre-QA steps
# Install QA steps
Infrastructure provider
Configuration
Flavor - Prod
Dex IdP - Google
Dex Static User - Enabled and
[email protected]
added as an application developerCommands
Set the environment variable
NAMESPACE
to an application developer namespace (this cannot be a subnamespace)Set the environment variable
DOMAIN
to the environment domainAutomated tests
Note
As platform administrator
./bin/ck8s test sc|wc
tests/
successfulmake build-main
tests/
successfulmake ctr-run-end-to-end
Kubernetes access
Note
As platform administrator
Note
As application developer
[email protected]
Can login as application developer
[email protected]
via Dex with static userCan list access
kubectl -n "${NAMESPACE}" auth can-i --list
Can delegate admin access
Can delegate view access
Cannot run with root by default
Hierarchical Namespaces
Note
As application developer
[email protected]
Can create a subnamespace by following the application developer docs
Commands
Ensure the default roles, rolebindings, and networkpolicies propagated
Commands
Harbor
Note
As application developer
[email protected]
Can login as application developer via Dex with static user
Steps
Login to Harbor with
[email protected]
xdg-open "https://harbor.${DOMAIN}"
Login to Harbor with the admin user and promote
[email protected]
to adminRe-login with
[email protected]
Can create projects and push images by following the application developer docs
Can configure image pull secret by following the application developer docs
Can scan image for vulnerabilities
Configure project to disallow vulnerabilities
Try to pull image with vulnerabilities, should fail
docker pull "harbor.${DOMAIN}/${REGISTRY_PROJECT}/ck8s-user-demo:${TAG}"
Configure project to allow vulnerabilities
Try to pull image with vulnerabilities, should succeed
docker pull "harbor.${DOMAIN}/${REGISTRY_PROJECT}/ck8s-user-demo:${TAG}"
Gatekeeper
Note
As application developer
[email protected]
Can list OPA rules
Note
Using the user demo helm chart
Set
NAMESPACE
to an application developer namespacesSet
PUBLIC_DOCS_PATH
to the path of the public docs repoWith invalid image repository, try to deploy, should warn due to constraint
With invalid image tag, try to deploy, should fail due to constraint
With unset networkpolicies, try to deploy, should warn due to constraint
With unset resources, try to deploy, should fail due to constraint
With valid values, try to deploy, should succeed
cert-manager and ingress-nginx
Note
As platform administrator
Metrics
Note
As platform administrator
Note
As application developer
[email protected]
Can login to application developer Grafana via Dex with static user
Steps
Login to Grafana with
[email protected]
xdg-open "https://grafana.${DOMAIN}"
Login to Grafana with the admin user and promote
[email protected]
to adminRe-login with
[email protected]
Welcome dashboard presented first
Dashboards are available and viewable
Metrics are available from all clusters
Metrics are available from user demo application
CISO dashboards available and working
List
Alerts
Note
As platform administrator
Watchdog
,CPUThrottlingHigh
andFalcoAlert
Note
As application developer
[email protected]
Watchdog
firingLogs
Note
As platform administrator
Note
As application developer
[email protected]
Falco
Note
As platform administrator
Deploy the falcosecurity/event-generator to generate events in wc
Commands
Logs are available in OpenSearch Dashboards
Logs are relevant
Network policies
Infrastructure tests
terraform plan
without changes# Upgrade QA steps
Note
The upgrade is done as part of the checklist.
Infrastructure provider
Configuration
Flavor - Prod
Dex IdP - Google
Dex Static User - Enabled and
[email protected]
added as an application developerCommands
Set the environment variable
NAMESPACE
to an application developer namespace (this cannot be a subnamespace)Set the environment variable
DOMAIN
to the environment domainUpgrade
Automated tests
Note
As platform administrator
./bin/ck8s test sc|wc
tests/
successfulmake build-main
tests/
successfulmake ctr-run-end-to-end
Kubernetes access
Note
As platform administrator
Note
As application developer
[email protected]
Can login as application developer
[email protected]
via Dex with static userCan list access
kubectl -n "${NAMESPACE}" auth can-i --list
Can delegate admin access
Can delegate view access
Cannot run with root by default
Hierarchical Namespaces
Note
As application developer
[email protected]
Can create a subnamespace by following the application developer docs
Commands
Ensure the default roles, rolebindings, and networkpolicies propagated
Commands
Harbor
Note
As application developer
[email protected]
Can login as application developer via Dex with static user
Steps
Login to Harbor with
[email protected]
xdg-open "https://harbor.${DOMAIN}"
Login to Harbor with the admin user and promote
[email protected]
to adminRe-login with
[email protected]
Can create projects and push images by following the application developer docs
Can configure image pull secret by following the application developer docs
Can scan image for vulnerabilities
Configure project to disallow vulnerabilities
Try to pull image with vulnerabilities, should fail
docker pull "harbor.${DOMAIN}/${REGISTRY_PROJECT}/welkin-user-demo:${TAG}"
Configure project to allow vulnerabilities
Try to pull image with vulnerabilities, should succeed
docker pull "harbor.${DOMAIN}/${REGISTRY_PROJECT}/welkin-user-demo:${TAG}"
Gatekeeper
Note
As application developer
[email protected]
Can list OPA rules
Note
Using the user demo helm chart
Set
NAMESPACE
to an application developer namespacesSet
PUBLIC_DOCS_PATH
to the path of the public docs repoWith invalid image repository, try to deploy, should warn due to constraint
With invalid image tag, try to deploy, should fail due to constraint
With unset networkpolicies, try to deploy, should warn due to constraint
With unset resources, try to deploy, should fail due to constraint
With valid values, try to deploy, should succeed
cert-manager and ingress-nginx
Note
As platform administrator
Metrics
Note
As platform administrator
Note
As application developer
[email protected]
Can login to application developer Grafana via Dex with static user
Steps
Login to Grafana with
[email protected]
xdg-open "https://grafana.${DOMAIN}"
Login to Grafana with the admin user and promote
[email protected]
to adminRe-login with
[email protected]
Welcome dashboard presented first
Dashboards are available and viewable
Metrics are available from all clusters
Metrics are available from user demo application
CISO dashboards available and working
List
Alerts
Note
As platform administrator
Watchdog
,CPUThrottlingHigh
andFalcoAlert
Note
As application developer
[email protected]
Watchdog
firingLogs
Note
As platform administrator
Note
As application developer
[email protected]
Falco
Note
As platform administrator
Deploy the falcosecurity/event-generator to generate events in wc
Commands
Logs are available in OpenSearch Dashboards
Logs are relevant
Network policies
Infrastructure tests
terraform plan
without changes# Post-QA steps
# Release steps
The text was updated successfully, but these errors were encountered: