You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+16-6Lines changed: 16 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,10 +7,10 @@ The target operating model has two clusters:
7
7
- One in a "trusted" zone where the remote attestation, KMS and Key Broker infrastructure are deployed.
8
8
- A second where a subset of workloads are deployed in confidential containers.
9
9
10
-
**For the current version of this application the confidential containers assumes deployment to Azure**
10
+
The current version of this application the confidential containers assumes deployment to Azure.
11
+
12
+
On the platform a sample workload is deployed:
11
13
12
-
On the platform a a sample workload is deployed:
13
-
14
14
1. Sample hello world applications to allow users to experiment with the policies for CoCo and the KBS (trustee).
15
15
2. A sample application `kbs-access` which presents secrets obtained from trustee to a web service. This is designed to allow users to test locked down environments.
16
16
@@ -31,12 +31,14 @@ Future work includes:
31
31
32
32
### `2.*`
33
33
This is currently the `main` branch for the repository. Version 2.* of the pattern is currently constrained to support:
The pattern has been tested on Azure for two installation methods:
41
+
40
42
1. Installing onto an ARO cluster
41
43
2. Self managed OpenShift install using the `openshift-install` CLI.
42
44
@@ -47,9 +49,11 @@ The pattern has been tested on Azure for two installation methods:
47
49
1.0.0 supports OpenShift Sandboxed containers version `1.8.1` along with Trustee version `0.2.0`.
48
50
49
51
The pattern has been tested on Azure for one installation method:
52
+
50
53
1. Self managed OpenShift install using the `openshift-install` CLI
54
+
2. Installing on top of an existing Azure Red Hat OpenShift (ARO) cluster
51
55
52
-
## validated pattern flavours
56
+
## Validated pattern flavours
53
57
**Today the demo has one flavour**.
54
58
A number are planned based on various different hub cluster-groups.
55
59
You can change between behaviour by configuring [`global.main.clusterGroupName`](https://validatedpatterns.io/learn/values-files/) key in the `values-global.yaml` file.
@@ -67,13 +71,15 @@ It deploys a hello-openshift application 3 times:
67
71
The instructions here presume you have a cluster. See further down for provisioning instructions for a cluster.
68
72
69
73
#### Fork and Clone the GitHub repo
74
+
70
75
1. Following [standard validated patterns workflow](https://validatedpatterns.io/learn/workflow/) fork the repository and clone to your development environment which has `podman` and `git`
71
76
2. If using a particular version (e.g. `1.0.0`) checkout the correct tag.
72
77
73
78
> [!TIP]
74
79
> Forking is essential as the validated pattern uses ArgoCD to reconcile it's state against your remote (forked) repository.
75
80
76
81
#### Configuring required secrets / parameters
82
+
77
83
The secrets here secure Trustee and the peer-pod vms. Mostly they are for demonstration purposes.
78
84
This only has to be done once.
79
85
@@ -118,7 +124,8 @@ If you need a Let's Encrypt certificate to be issued the `letsencrypt` applicati
118
124
> Configuration changes are only effective once committed and pushed to your remote repository.
119
125
120
126
#### Installing onto a cluster
121
-
Once you configuration is pushed (if required) `./pattern.sh make install` to provision a cluster.
127
+
128
+
Once you configuration is pushed (if required) `./pattern.sh make install` to provision a cluster.
122
129
123
130
> [!TIP]
124
131
> The branch and default origin you have checked-out in your local repository is used to determine what ArgoCD and the patterns operator should reconcile against. Typical choices are to use the main for your fork.
@@ -128,11 +135,12 @@ Once you configuration is pushed (if required) `./pattern.sh make install` to pr
128
135
### Single cluster install on an OCP cluster on azure using Red Hat Demo Platform
129
136
130
137
Red Hat a demo platform. This allows easy access for Red Hat associates and partners to ephemeral cloud resources. The pattern is known to work with this setup.
138
+
131
139
1. Get the [openshift installer](https://console.redhat.com/openshift/downloads)
132
140
1. **NOTE: openshift installer must be updated regularly if you want to automatically provision the latest versions of OCP**
133
141
2. Get access to an [Azure Subscription Based Blank Open Environment](https://catalog.demo.redhat.com/catalog?category=Open_Environments&search=azure&item=babylon-catalog-prod%2Fazure-gpte.open-environment-azure-subscription.prod).
134
142
3. Import the required azure environmental variables (see coded block):
135
-
```
143
+
```shell
136
144
export GUID=
137
145
export CLIENT_ID=
138
146
export PASSWORD=
@@ -148,6 +156,7 @@ Red Hat a demo platform. This allows easy access for Red Hat associates and part
148
156
1. You *may* need to recreate the hello world peer-pods depending on timeouts.
149
157
150
158
### Single cluster install on plain old azure *not* using Red Hat Demo Platform
159
+
151
160
**NOTE: Don't use the default node sizes.. increase the node sizes such as below**
152
161
153
162
1. Login to console.redhat.com
@@ -170,4 +179,5 @@ Red Hat a demo platform. This allows easy access for Red Hat associates and part
0 commit comments