Skip to content

Commit bf16470

Browse files
committed
OSDOCS-15110 updated uninstall resources
1 parent 5be4ff7 commit bf16470

17 files changed

+167
-45
lines changed

_topic_maps/_topic_map.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1239,8 +1239,6 @@ Topics:
12391239
File: zero-trust-manager-overview
12401240
- Name: Zero Trust Workload Identity Manager release notes
12411241
File: zero-trust-manager-release-notes
1242-
- Name: Zero Trust Workload Identity Manager components and features
1243-
File: zero-trust-manager-features
12441242
- Name: Installing Zero Trust Workload Identity Manager
12451243
File: zero-trust-manager-install
12461244
- Name: Deploying Zero Trust Workload Identity Manager operands

modules/zero-trust-manager-about-agent.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@
88

99
The SPIRE Agent is responsible for workload attestation, ensuring that workloads receive a verified identity when requesting authentication through the SPIFFE Workload API. It accomplishes this by using configured workload attestor plugins. In Kubernetes environments, the Kubernetes workload attestor plugin is used.
1010

11-
SPIRE and the SPIRE agent perform node attestation via node plugins. The plugins are used to verify the identity of the node on which the agent is running. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-agent[About the SPIRE Agent].
11+
SPIRE and the SPIRE Agent perform node attestation via node plugins. The plugins are used to verify the identity of the node on which the agent is running. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-agent[About the SPIRE Agent].
1212

modules/zero-trust-manager-about-attestation.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@
99

1010
Attestation is the process by which the identity of nodes and workloads are verified before SPIFFE IDs and SVIDs are issued. The SPIRE server gathers attributes of both the workload and node that the SPIRE Agent runs on, and then compares them to a set of selectors defined when the workload was registered. If the comparison is successful, the entities are provided with credentials. This ensures that only legitimate and expected entities within the trust domain receive cryptographic identities. The two main types of attestation in SPIFFE/SPIRE are:
1111

12-
* Node attestation: verifies the identity of a machine or a node on a system, before a SPIRE agent running on that node can be trusted to request identities for workloads.
13-
* Workload attestation: verifies the identity of an application or service running on an attested node before the SPIRE agent on that node can provide it with a SPIFFE ID and SVID.
12+
* Node attestation: verifies the identity of a machine or a node on a system, before a SPIRE Agent running on that node can be trusted to request identities for workloads.
13+
14+
* Workload attestation: verifies the identity of an application or service running on an attested node before the SPIRE Agent on that node can provide it with a SPIFFE ID and SVID.
1415
1516
For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#attestation[Attestation].

modules/zero-trust-manager-about-features.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@
77
= {zero-trust-full} features
88

99
[id="spire-telemetry_{context}"]
10-
== SPIRE server and agent telemetry
10+
== SPIRE server and Agent telemetry
1111

12-
SPIRE server and agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, spire component performance, attestation and SVID issuance and plugin statistics.
12+
SPIRE server and Agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, spire component performance, attestation and SVID issuance and plugin statistics.

modules/zero-trust-manager-enable-metrics-agent.adoc

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,25 @@
44

55
:_mod-docs-content-type: PROCEDURE
66
[id="zero-trust-manager-enable-metrics-agent_{context}"]
7-
= Configuring metrics collection for SPIRE agent by using a Service Monitor
7+
= Configuring metrics collection for SPIRE Agent by using a Service Monitor
88

99
The SPIRE Agent operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Agent by creating a `ServiceMonitor` custom resource (CR), which enables Prometheus Operator to collect custom metrics.
1010

1111
.Prerequisites
1212

1313
* You have access to the cluster as a user with the `cluster-admin` cluster role.
14+
1415
* You have installed the {zero-trust-full}.
16+
1517
* You have deployed the SPIRE Agent operand in the cluster.
18+
1619
* You have enabled the user workload monitoring.
1720
1821
.Procedure
1922

2023
. Create the `ServiceMonitor` CR:
2124

22-
.. Create the YAML file that defines `ServiceMonitor` CR:
25+
.. Create the YAML file that defines the `ServiceMonitor` CR:
2326
+
2427
.Example `servicemonitor-spire-agent.yaml` file
2528
[source,yaml]

modules/zero-trust-manager-enable-metrics-server.adoc

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,20 +6,23 @@
66
[id="zero-trust-manager-enable-metrics-server_{context}"]
77
= Configuring metrics collection for SPIRE server by using a Service Monitor
88

9-
The SPIRE Server operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Server by creating a `ServiceMonitor` custom resource (CR) that enables Prometheus Operator to collect custom metrics.
9+
The SPIRE server operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE server by creating a `ServiceMonitor` custom resource (CR) that enables Prometheus Operator to collect custom metrics.
1010

1111
.Prerequisites
1212

1313
* You have access to the cluster as a user with the `cluster-admin` cluster role.
14+
1415
* You have installed the {zero-trust-full}.
15-
* You have deployed the SPIRE Server operand in the cluster.
16+
17+
* You have deployed the SPIRE server operand in the cluster.
18+
1619
* You have enabled the user workload monitoring.
1720
1821
.Procedure
1922

2023
. Create the `ServiceMonitor` CR:
2124

22-
.. Create the YAML file that defines `ServiceMonitor` CR:
25+
.. Create the YAML file that defines the `ServiceMonitor` CR:
2326
+
2427
.Example `servicemonitor-spire-server` file
2528
[source,yaml]
@@ -53,7 +56,7 @@ spec:
5356
$ oc create -f servicemonitor-spire-server.yaml
5457
----
5558
+
56-
After the `ServiceMonitor` CR is created, the user workload Prometheus instance begins metrics collection from the SPIRE Server. The collected metrics are labeled with `job="spire-server"`.
59+
After the `ServiceMonitor` CR is created, the user workload Prometheus instance begins metrics collection from the SPIRE server. The collected metrics are labeled with `job="spire-server"`.
5760

5861
.Verification
5962

modules/zero-trust-manager-how-it-works.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,18 @@
44

55
:_mod-docs-content-type: CONCEPT
66
[id="zero-trust-manager-how-it-works_{context}"]
7-
== {zero-trust-full} workflow
7+
= {zero-trust-full} workflow
88

99

1010
The following is a high-level workflow of the {zero-trust-full} within the Red{nbsp}Hat OpenShift cluster.
1111

12-
. The SPIRE, SPIRE agent, SPIFFE CSI Driver, and the SPIRE OIDC Discovery Provider operands are deployed and managed by {zero-trust-full} via associated Customer Resource Definitions (CRDs).
12+
. The SPIRE, SPIRE Agent, SPIFFE CSI Driver, and the SPIRE OIDC Discovery Provider operands are deployed and managed by {zero-trust-full} via associated Customer Resource Definitions (CRDs).
1313

1414
. Watches are then registered for relevant Kubernetes resources and the necessary SPIRE CRDs are applied to the cluster.
1515

1616
. The CR for the ZeroTrustWorkloadIdentityManager resource named `cluster` is deployed and managed by a controller.
1717

18-
. To deploy the SPIRE server, SPIRE agent, SPIFFE CSI Driver, and SPIRE OIDC Discovery Provider, you need to create a custom resource of a each certain type and name it `cluster`. The custom resource types are as follows:
18+
. To deploy the SPIRE server, SPIRE Agent, SPIFFE CSI Driver, and SPIRE OIDC Discovery Provider, you need to create a custom resource of a each certain type and name it `cluster`. The custom resource types are as follows:
1919

2020
* SPIRE server - `SpireServer`
2121
@@ -25,7 +25,7 @@ The following is a high-level workflow of the {zero-trust-full} within the Red{n
2525
2626
* SPIRE OIDC discovery provider - `SpireOIDCDiscoveryProvider`
2727
28-
. When a node starts, the SPIRE agent initializes, and connects to the SPIRE server.
28+
. When a node starts, the SPIRE Agent initializes, and connects to the SPIRE server.
2929

3030
. The agent begins the node attestation process. The agent collects information on the node's identity such as label name and namespace. The agent securely provides the information it gathered through the attestation to the SPIRE server.
3131

modules/zero-trust-manager-install-cli.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ $ oc create -f subscription.yaml
7373

7474
.Verification
7575

76-
. Verify that the OLM subscription is created by running the following command:
76+
* Verify that the OLM subscription is created by running the following command:
7777
+
7878
[source, terminal]
7979
----
@@ -87,7 +87,7 @@ NAME PACKAGE
8787
openshift-zero-trust-workload-identity-manager zero-trust-workload-identity-manager redhat-operators tech-preview-v0.1
8888
----
8989
90-
. Verify whether the Operator is successfully installed by running the following command:
90+
* Verify whether the Operator is successfully installed by running the following command:
9191
+
9292
[source, terminal]
9393
----
@@ -101,7 +101,7 @@ NAME DISPLAY
101101
zero-trust-workload-identity-manager.v0.1.0 Zero Trust Workload Identity Manager 0.1.0 Succeeded
102102
----
103103
104-
. Verify that the {zero-trust-full} controller manager is ready by running the following command:
104+
* Verify that the {zero-trust-full} controller manager is ready by running the following command:
105105
+
106106
[source, terminal]
107107
----

modules/zero-trust-manager-install-console.adoc

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ You can use the web console to install the {zero-trust-full}.
1111
.Prerequisites
1212

1313
* You have access to the cluster with `cluster-admin` privileges.
14+
1415
* You have access to the {product-title} web console.
1516
1617
.Procedure
@@ -26,7 +27,9 @@ You can use the web console to install the {zero-trust-full}.
2627
. Select the {zero-trust-full} version from *Version* drop-down list, and click *Install*.
2728

2829
. On the *Install Operator* page:
30+
2931
.. Update the *Update channel*, if necessary. The channel defaults to *tech-preview-v0.1*, which installs the latest Technology Preview v0.1 release of the {zero-trust-full}.
32+
3033
.. Choose the *Installed Namespace* for the Operator. The default Operator namespace is `zero-trust-workload-identity-manager`.
3134
+
3235
If the `zero-trust-workload-identity-manager` namespace does not exist, it is created for you.
@@ -41,9 +44,11 @@ If the `zero-trust-workload-identity-manager` namespace does not exist, it is cr
4144

4245
.Verification
4346

44-
. Navigate to *Operators* -> *Installed Operators*.
45-
. Verify that *{zero-trust-full}* is listed with a *Status* of *Succeeded* in the `zero-trust-workload-identity-manager` namespace.
46-
. Verify that {zero-trust-full} controller manager deployment is ready and available by running the following command:
47+
* Navigate to *Operators* -> *Installed Operators*.
48+
49+
** Verify that *{zero-trust-full}* is listed with a *Status* of *Succeeded* in the `zero-trust-workload-identity-manager` namespace.
50+
51+
** Verify that {zero-trust-full} controller manager deployment is ready and available by running the following command:
4752
+
4853
[source,terminal]
4954
----

modules/zero-trust-manager-oidc-config.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ spec:
3434
jwtIssuer: <jwt_issuer_domain> #<3>
3535
----
3636
<1> The trust domain to be used for the SPIFFE identifiers.
37-
<2> The name of the SPIRE agent unix socket.
37+
<2> The name of the SPIRE Agent unix socket.
3838
<3> The JSON Web Token (JWT) issuer domain. The default value is set to the value specified in `oidc-discovery.$trustDomain`.
3939

4040
.. Apply the configuration by running the following command:

0 commit comments

Comments
 (0)