Progress on rhacs talk demos.
This commit is contained in:
1
2025-01-28-advanced-cluster-security/.gitignore
vendored
Normal file
1
2025-01-28-advanced-cluster-security/.gitignore
vendored
Normal file
@ -0,0 +1 @@
|
||||
.env
|
||||
136
2025-01-28-advanced-cluster-security/README.org
Normal file
136
2025-01-28-advanced-cluster-security/README.org
Normal file
@ -0,0 +1,136 @@
|
||||
#+TITLE: Red Hat Advanced Cluster Security
|
||||
#+DATE: <2025-01-28 Tue>
|
||||
#+AUTHOR: James Blair
|
||||
|
||||
|
||||
* Initial demo setup
|
||||
|
||||
** Verify cluster auth status
|
||||
|
||||
#+NAMEL: Verify cluster login status
|
||||
#+begin_src tmux
|
||||
oc status && oc whoami
|
||||
#+end_src
|
||||
|
||||
|
||||
** Install the compliance operator
|
||||
|
||||
#+NAME: Install openshift compliance operator
|
||||
#+begin_src tmux
|
||||
cat << EOF | oc apply --filename -
|
||||
# Create a dedicated namespace for dev spaces
|
||||
apiVersion: v1
|
||||
kind: Namespace
|
||||
metadata:
|
||||
name: openshift-compliance
|
||||
|
||||
---
|
||||
# Create an operatorgroup resource for the openshift-compliance namespace
|
||||
apiVersion: operators.coreos.com/v1
|
||||
kind: OperatorGroup
|
||||
metadata:
|
||||
name: openshift-compliance-8m7b7
|
||||
namespace: openshift-compliance
|
||||
|
||||
---
|
||||
# Create a subscription for the compliance operator
|
||||
apiVersion: operators.coreos.com/v1alpha1
|
||||
kind: Subscription
|
||||
metadata:
|
||||
name: compliance-operator
|
||||
namespace: openshift-compliance
|
||||
spec:
|
||||
channel: stable
|
||||
installPlanApproval: Automatic
|
||||
source: redhat-operators
|
||||
sourceNamespace: openshift-marketplace
|
||||
name: compliance-operator
|
||||
EOF
|
||||
#+end_src
|
||||
|
||||
|
||||
** Create compliance scanschedule
|
||||
|
||||
#+NAME: Create compliance scan schedule
|
||||
#+begin_src tmux
|
||||
apiVersion: compliance.openshift.io/v1alpha1
|
||||
kind: ComplianceSuite
|
||||
metadata:
|
||||
finalizers:
|
||||
- suite.finalizers.compliance.openshift.io
|
||||
name: nist-800-53-daily
|
||||
namespace: openshift-compliance
|
||||
spec:
|
||||
scans:
|
||||
- content: ssg-ocp4-ds.xml
|
||||
contentImage: registry.redhat.io/compliance/openshift-compliance-content-rhel8@sha256:b286929357b82f8ff3845f535bab23382bf06f075ff2379063e2456f1a93e809
|
||||
maxRetryOnTimeout: 3
|
||||
name: ocp4-moderate
|
||||
profile: xccdf_org.ssgproject.content_profile_moderate
|
||||
rawResultStorage:
|
||||
pvAccessModes:
|
||||
- ReadWriteOnce
|
||||
rotation: 3
|
||||
size: 1Gi
|
||||
scanTolerations:
|
||||
- operator: Exists
|
||||
scanType: Platform
|
||||
showNotApplicable: false
|
||||
strictNodeScan: false
|
||||
timeout: 30m0s
|
||||
- content: ssg-ocp4-ds.xml
|
||||
contentImage: registry.redhat.io/compliance/openshift-compliance-content-rhel8@sha256:b286929357b82f8ff3845f535bab23382bf06f075ff2379063e2456f1a93e809
|
||||
maxRetryOnTimeout: 3
|
||||
name: ocp4-moderate-node-master
|
||||
nodeSelector:
|
||||
node-role.kubernetes.io/master: ""
|
||||
profile: xccdf_org.ssgproject.content_profile_moderate-node
|
||||
rawResultStorage:
|
||||
pvAccessModes:
|
||||
- ReadWriteOnce
|
||||
rotation: 3
|
||||
size: 1Gi
|
||||
scanTolerations:
|
||||
- operator: Exists
|
||||
scanType: Node
|
||||
showNotApplicable: false
|
||||
strictNodeScan: false
|
||||
timeout: 30m0s
|
||||
- content: ssg-ocp4-ds.xml
|
||||
contentImage: registry.redhat.io/compliance/openshift-compliance-content-rhel8@sha256:b286929357b82f8ff3845f535bab23382bf06f075ff2379063e2456f1a93e809
|
||||
maxRetryOnTimeout: 3
|
||||
name: ocp4-moderate-node-worker
|
||||
nodeSelector:
|
||||
node-role.kubernetes.io/worker: ""
|
||||
profile: xccdf_org.ssgproject.content_profile_moderate-node
|
||||
rawResultStorage:
|
||||
pvAccessModes:
|
||||
- ReadWriteOnce
|
||||
rotation: 3
|
||||
size: 1Gi
|
||||
scanTolerations:
|
||||
- operator: Exists
|
||||
scanType: Node
|
||||
showNotApplicable: false
|
||||
strictNodeScan: false
|
||||
timeout: 30m0s
|
||||
schedule: 0 1 * * *
|
||||
suspend: false
|
||||
#+end_src
|
||||
|
||||
|
||||
** Authenticate with roxctl
|
||||
|
||||
#+NAME: Login to central via roxctl
|
||||
#+begin_src tmux
|
||||
source .env
|
||||
roxctl central login && roxctl central whoami
|
||||
#+end_src
|
||||
|
||||
* Demo - Identifying vulnerabilities in a workload
|
||||
|
||||
#+NAME: Identifying vulnerabilities in a workload
|
||||
#+begin_src tmux
|
||||
|
||||
|
||||
#+end_src
|
||||
Reference in New Issue
Block a user