You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/zero-trust-manager-about-agent.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,5 +8,5 @@
8
8
9
9
The SPIRE Agent is responsible for workload attestation, ensuring that workloads receive a verified identity when requesting authentication through the SPIFFE Workload API. It accomplishes this by using configured workload attestor plugins. In Kubernetes environments, the Kubernetes workload attestor plugin is used.
10
10
11
-
SPIRE and the SPIRE agent perform node attestation via node plugins. The plugins are used to verify the identity of the node on which the agent is running. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-agent[About the SPIRE Agent].
11
+
SPIRE and the SPIRE Agent perform node attestation via node plugins. The plugins are used to verify the identity of the node on which the agent is running. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-agent[About the SPIRE Agent].
Copy file name to clipboardExpand all lines: modules/zero-trust-manager-about-attestation.adoc
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,8 @@
9
9
10
10
Attestation is the process by which the identity of nodes and workloads are verified before SPIFFE IDs and SVIDs are issued. The SPIRE server gathers attributes of both the workload and node that the SPIRE Agent runs on, and then compares them to a set of selectors defined when the workload was registered. If the comparison is successful, the entities are provided with credentials. This ensures that only legitimate and expected entities within the trust domain receive cryptographic identities. The two main types of attestation in SPIFFE/SPIRE are:
11
11
12
-
* Node attestation: verifies the identity of a machine or a node on a system, before a SPIRE agent running on that node can be trusted to request identities for workloads.
13
-
* Workload attestation: verifies the identity of an application or service running on an attested node before the SPIRE agent on that node can provide it with a SPIFFE ID and SVID.
12
+
* Node attestation: verifies the identity of a machine or a node on a system, before a SPIRE Agent running on that node can be trusted to request identities for workloads.
13
+
14
+
* Workload attestation: verifies the identity of an application or service running on an attested node before the SPIRE Agent on that node can provide it with a SPIFFE ID and SVID.
14
15
15
16
For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#attestation[Attestation].
Copy file name to clipboardExpand all lines: modules/zero-trust-manager-about-features.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,6 @@
7
7
= {zero-trust-full} features
8
8
9
9
[id="spire-telemetry_{context}"]
10
-
== SPIRE server and agent telemetry
10
+
== SPIRE server and Agent telemetry
11
11
12
-
SPIRE server and agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, spire component performance, attestation and SVID issuance and plugin statistics.
12
+
SPIRE server and Agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, spire component performance, attestation and SVID issuance and plugin statistics.
= Configuring metrics collection for SPIRE agent by using a Service Monitor
7
+
= Configuring metrics collection for SPIRE Agent by using a Service Monitor
8
8
9
9
The SPIRE Agent operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Agent by creating a `ServiceMonitor` custom resource (CR), which enables Prometheus Operator to collect custom metrics.
10
10
11
11
.Prerequisites
12
12
13
13
* You have access to the cluster as a user with the `cluster-admin` cluster role.
14
+
14
15
* You have installed the {zero-trust-full}.
16
+
15
17
* You have deployed the SPIRE Agent operand in the cluster.
18
+
16
19
* You have enabled the user workload monitoring.
17
20
18
21
.Procedure
19
22
20
23
. Create the `ServiceMonitor` CR:
21
24
22
-
.. Create the YAML file that defines `ServiceMonitor` CR:
25
+
.. Create the YAML file that defines the `ServiceMonitor` CR:
= Configuring metrics collection for SPIRE server by using a Service Monitor
8
8
9
-
The SPIRE Server operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Server by creating a `ServiceMonitor` custom resource (CR) that enables Prometheus Operator to collect custom metrics.
9
+
The SPIRE server operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE server by creating a `ServiceMonitor` custom resource (CR) that enables Prometheus Operator to collect custom metrics.
10
10
11
11
.Prerequisites
12
12
13
13
* You have access to the cluster as a user with the `cluster-admin` cluster role.
14
+
14
15
* You have installed the {zero-trust-full}.
15
-
* You have deployed the SPIRE Server operand in the cluster.
16
+
17
+
* You have deployed the SPIRE server operand in the cluster.
18
+
16
19
* You have enabled the user workload monitoring.
17
20
18
21
.Procedure
19
22
20
23
. Create the `ServiceMonitor` CR:
21
24
22
-
.. Create the YAML file that defines `ServiceMonitor` CR:
25
+
.. Create the YAML file that defines the `ServiceMonitor` CR:
23
26
+
24
27
.Example `servicemonitor-spire-server` file
25
28
[source,yaml]
@@ -53,7 +56,7 @@ spec:
53
56
$ oc create -f servicemonitor-spire-server.yaml
54
57
----
55
58
+
56
-
After the `ServiceMonitor` CR is created, the user workload Prometheus instance begins metrics collection from the SPIRE Server. The collected metrics are labeled with `job="spire-server"`.
59
+
After the `ServiceMonitor` CR is created, the user workload Prometheus instance begins metrics collection from the SPIRE server. The collected metrics are labeled with `job="spire-server"`.
Copy file name to clipboardExpand all lines: modules/zero-trust-manager-how-it-works.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,18 +4,18 @@
4
4
5
5
:_mod-docs-content-type: CONCEPT
6
6
[id="zero-trust-manager-how-it-works_{context}"]
7
-
=={zero-trust-full} workflow
7
+
= {zero-trust-full} workflow
8
8
9
9
10
10
The following is a high-level workflow of the {zero-trust-full} within the Red{nbsp}Hat OpenShift cluster.
11
11
12
-
. The SPIRE, SPIRE agent, SPIFFE CSI Driver, and the SPIRE OIDC Discovery Provider operands are deployed and managed by {zero-trust-full} via associated Customer Resource Definitions (CRDs).
12
+
. The SPIRE, SPIRE Agent, SPIFFE CSI Driver, and the SPIRE OIDC Discovery Provider operands are deployed and managed by {zero-trust-full} via associated Customer Resource Definitions (CRDs).
13
13
14
14
. Watches are then registered for relevant Kubernetes resources and the necessary SPIRE CRDs are applied to the cluster.
15
15
16
16
. The CR for the ZeroTrustWorkloadIdentityManager resource named `cluster` is deployed and managed by a controller.
17
17
18
-
. To deploy the SPIRE server, SPIRE agent, SPIFFE CSI Driver, and SPIRE OIDC Discovery Provider, you need to create a custom resource of a each certain type and name it `cluster`. The custom resource types are as follows:
18
+
. To deploy the SPIRE server, SPIRE Agent, SPIFFE CSI Driver, and SPIRE OIDC Discovery Provider, you need to create a custom resource of a each certain type and name it `cluster`. The custom resource types are as follows:
19
19
20
20
* SPIRE server - `SpireServer`
21
21
@@ -25,7 +25,7 @@ The following is a high-level workflow of the {zero-trust-full} within the Red{n
. When a node starts, the SPIRE agent initializes, and connects to the SPIRE server.
28
+
. When a node starts, the SPIRE Agent initializes, and connects to the SPIRE server.
29
29
30
30
. The agent begins the node attestation process. The agent collects information on the node's identity such as label name and namespace. The agent securely provides the information it gathered through the attestation to the SPIRE server.
Copy file name to clipboardExpand all lines: modules/zero-trust-manager-install-console.adoc
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,7 @@ You can use the web console to install the {zero-trust-full}.
11
11
.Prerequisites
12
12
13
13
* You have access to the cluster with `cluster-admin` privileges.
14
+
14
15
* You have access to the {product-title} web console.
15
16
16
17
.Procedure
@@ -26,7 +27,9 @@ You can use the web console to install the {zero-trust-full}.
26
27
. Select the {zero-trust-full} version from *Version* drop-down list, and click *Install*.
27
28
28
29
. On the *Install Operator* page:
30
+
29
31
.. Update the *Update channel*, if necessary. The channel defaults to *tech-preview-v0.1*, which installs the latest Technology Preview v0.1 release of the {zero-trust-full}.
32
+
30
33
.. Choose the *Installed Namespace* for the Operator. The default Operator namespace is `zero-trust-workload-identity-manager`.
31
34
+
32
35
If the `zero-trust-workload-identity-manager` namespace does not exist, it is created for you.
@@ -41,9 +44,11 @@ If the `zero-trust-workload-identity-manager` namespace does not exist, it is cr
41
44
42
45
.Verification
43
46
44
-
. Navigate to *Operators*->*Installed Operators*.
45
-
. Verify that *{zero-trust-full}* is listed with a *Status* of *Succeeded* in the `zero-trust-workload-identity-manager` namespace.
46
-
. Verify that {zero-trust-full} controller manager deployment is ready and available by running the following command:
47
+
* Navigate to *Operators*->*Installed Operators*.
48
+
49
+
** Verify that *{zero-trust-full}* is listed with a *Status* of *Succeeded* in the `zero-trust-workload-identity-manager` namespace.
50
+
51
+
** Verify that {zero-trust-full} controller manager deployment is ready and available by running the following command:
0 commit comments