Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Managing clusters via ACM #29

Open
1 of 5 tasks
tumido opened this issue Feb 24, 2021 · 3 comments
Open
1 of 5 tasks

Managing clusters via ACM #29

tumido opened this issue Feb 24, 2021 · 3 comments
Assignees

Comments

@tumido
Copy link
Member

tumido commented Feb 24, 2021

Tracking issue for learning the ropes of ACM.

@tumido tumido self-assigned this Feb 24, 2021
@tumido tumido changed the title Resizing clusters via ACM Managing clusters via ACM Feb 24, 2021
@tumido
Copy link
Member Author

tumido commented Feb 24, 2021

Provisioning clusters

  1. create "provider connection" credentials
  2. create cluster instance

All in UI, declarative management is possible. The provider connection translates to a secret in selected namespace, we can map it to ArgoCD.

Creating a cluster creates a new namespace on the management (hub) cluster. This new namespace is named the same as the cluster (beware of reusing a name of an existing namespace for the cluster, I have no idea how that would behave).

This new namespace contains some secrets which contains (among others):

  • kubeadmin:password
  • kubeconfig

It takes about 30 mins to install and prepare a cluster.

@tumido
Copy link
Member Author

tumido commented Feb 24, 2021

RBAC

ACM has quite granular, though complicated RBAC
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/security/security#overview-of-roles

We currently have few cluster-admins, though we might need to expand this and allow people to manage/view certain clusters. The complication in this is due to the namespace ~ cluster mapping on the hub cluster. For user to view a certain cluster it requires him to be given a cluster role + namespace access.

@tumido
Copy link
Member Author

tumido commented Feb 24, 2021

Policy

We'll need to define policies if we want to go multi-cluster. I imagine we can have common policies for clusters running ODH, for Kubeflow clusters etc..

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.1/html/security/security#governance-and-risk

Samples available at the policy catalog (including community policies), might be a good inspiration for us.
https://github.com/open-cluster-management/policy-collection

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant