Skip to content

Commit 50354d1

Browse files
authored
fix: user context in labs (#110)
1 parent 6ca56e6 commit 50354d1

File tree

10 files changed

+83
-127
lines changed

10 files changed

+83
-127
lines changed

docs/for-ops/console/usermgnt.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,18 @@ User Management can only be used to manage the users of the platform instance (s
1616

1717
What you need to know about the User Management feature:
1818

19-
- Only Platform admins can create or delete users in the platform view.
20-
- A Platform admins can assign users the role of `platform admin`, `Team admin` or `Team member`.
19+
- Only Platform administrators can create or delete users in the platform view.
20+
- A Platform administrator can assign users the role of `platform administrator`, `team administrator` or `team member`.
2121
- Users can be created without assigning them directly to a Team.
22-
- Team admins can assign users the role of Team member of the Team they administer.
23-
- Team admins can not remove themselves from Teams they administer (this can only be done by the platform admin).
24-
- Team admins can not remove other Team admins from their teams (this can only be done by the platform admin).
25-
- Team admins can not add Platform admins to their Teams.
22+
- Team administrators can assign users the role of Team member of the Team they administer.
23+
- Team administrators can not remove themselves from Teams they administer (this can only be done by the platform admin).
24+
- Team administrators can not remove other Team administrators from their teams (this can only be done by the platform admin).
25+
- Team administrators can not add Platform administrators to their Teams.
2626
- Team members are not able to see the User Management section in the menu.
27-
- Users are stored encrypted in the `values` repository `env/secrets.users.yaml` file.
28-
- The initial login credentials of a new User can be copied from the platform view user management page by Platform admins only.
27+
- Users are stored encrypted in the `values` repository.
28+
- The initial login credentials of a new User can be copied from the platform view user management page by Platform administrators only.
2929
- Users’ passwords are not stored in the values repo (except initial password).
30-
- A password reset can only be performed by a Platform admin. Password restest need to be done in the Keycloak app using the `otomi-admin` credentials. As an alternative Platform admin can also re-create a user.
31-
- The User management feature follows the Single Source of Truth principle by referencing the `env/secrets.users.yaml` file in the `values` repository. If a new user is created directly in Keycloak, this user will be deleted at the next commit.
30+
- A password reset can only be performed by a Platform admin. A password reset needs to be done in the Keycloak app using the `otomi-admin` credentials. As an alternative a user with the platform administrator role can also re-create a user.
3231
- Kubernetes secrets are used to pass user data between Pods, but there is a limit for user-defined variables. The maximum size of a user-defined environment variable is 32,767 characters. This limits the amount of users that can be created to around 200.
3332

3433
## Creating Users
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
slug: make-owner-in-gitea
3+
title: Make user Owner of a Gitea Organization
4+
sidebar_label: Make user Gitea Org Owner
5+
---
6+
7+
Follow these steps to add a user with the platform administrator role to the Owners group of a Team Organization in Gitea:
8+
9+
1. Open the Gitea app.
10+
11+
2. In the top right, click on your profile icon.
12+
13+
3. Click `Site Administration`.
14+
15+
4. Click on `Identity & Access` in the `Admin Settings` on the left and then click on `Organizations`.
16+
17+
5. Click on the Organization where you want to become an owner of.
18+
19+
6. In the `Teams` section, click on `Owners`.
20+
21+
7. In the `Owners` section, click `Join`.

docs/for-ops/how-to/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ sidebar_label: Overview
1212

1313
### [Managing Ingress Controllers](ingress-classes.md).
1414

15-
### [Use the team-admin](use-team-admin.md).
16-
1715
### [Using Core only](core-only.md).
1816

1917
### [Create and restore backups](backups.md).
@@ -26,3 +24,5 @@ sidebar_label: Overview
2624

2725
### [Change or reset user passwords](change-user-passwords.md).
2826

27+
### [Make a platform admin Owner of a Team Organization in Gitea](make-owner-in-gitea.md)
28+

docs/for-ops/how-to/use-team-admin.md

Lines changed: 0 additions & 91 deletions
This file was deleted.

docs/get-started/labs/detect-threats.md

Lines changed: 20 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,35 +8,46 @@ sidebar_label: Detect Threats
88
Falco needs to be activated for this lab.
99
:::
1010

11+
:::info
12+
This lab requires a user with the `platform-administrator` role!
13+
:::
14+
1115
Falco is a cloud native security tool that provides runtime security. It leverages custom rules on Linux kernel events and other data sources through plugins, enriching event data with contextual metadata to deliver real-time alerts. Falco enables the detection of abnormal behavior, potential security threats, and compliance violations.
1216

1317
## Generate threats
1418

15-
For this lab we'll deploy the `event-generator` in a Team namespace. The event-generator is a tool designed to generate events for both syscalls and k8s audits. The tool can be used to check if Falco is working properly. It does so by performing a variety of suspects actions which trigger security events. The event-event generator implements a minimalistic framework which makes easy to implement new actions.
19+
For this lab we'll install the `event-generator` in a Team namespace. The event-generator is a tool designed to generate events for both syscalls and k8s audits. The tool can be used to check if Falco is working properly. It does so by performing a variety of suspects actions which trigger security events. The event-event generator implements a minimalistic framework which makes easy to implement new actions.
1620

17-
:::info
18-
Installing the `falcosecurity/event-generator` can only be done by a user with the platform admin role.
19-
:::
2021

21-
1. Add the falcosecurity charts repository:
22+
1. Sign in with a user that has the `platform-administrator` role.
23+
24+
2. Select view `team` and team `admin`.
25+
26+
3. In the left menu, click on `Shell.
27+
28+
4. Add the falcosecurity charts repository:
2229

2330
```bash
2431
helm repo add falcosecurity https://falcosecurity.github.io/charts
2532
helm repo update
2633
```
2734

28-
2. Install the chart in the team namespace:
35+
5. Install the chart in the team namespace:
2936

3037
```bash
3138
helm install team-labs falcosecurity/event-generator -n team-labs
3239
```
3340

41+
6. Sign out
42+
3443
## See the events in the detected threats in containers dashboard
3544

36-
1. In the left menu, click on `Apps` and open `Grafana`.
45+
1. Sign in as a Team member (using the `[email protected]` user).
46+
47+
2. In the left menu, click on `Apps` and open `Grafana`.
3748

38-
2. Click on the `Detected threats in containers` dashboards
49+
3. Click on the `Detected threats in containers` dashboards.
3950

40-
3. See all the generated threat events
51+
4. See all the generated threat events:
4152

4253
![falco-dashboard](../../img/falco-dashboard.png)

docs/get-started/labs/labs-prerequisites.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,13 @@ sidebar_label: Lab Prerequisites
66

77
## Prerequisites
88

9-
1. DNS is configured. See [here](get-started/installation/overview.md). Not needed when using the LKE automatic installation.
9+
1. Make sure App Platform is installed with DNS. See [here](get-started/installation/overview.md). Not needed when using the LKE automatic installation.
1010

11-
2. Prometheus is enabled on the platform level.
11+
2. Sign in with a user that has the `platform-administrator` role
1212

13-
2. Enable additional App on the platform level to support the following labs:
13+
3. Enable Prometheus on the platform level.
14+
15+
4. Enable additional Apps on the platform level to support the following labs:
1416

1517
| Lab | App |
1618
|---------------------------------------------|-------------------------------------|
@@ -26,22 +28,24 @@ sidebar_label: Lab Prerequisites
2628
For the [Tracing with Open Telemetry](use-otel.md) Lab, tracing needs to be configured in the `Istio` and `Nginx Ingress` apps.
2729
:::
2830

29-
3. A team called `labs` is created with `Dashboards` and `Alerts` enabled. See [here](docs/for-ops/console/teams.md) how to create Teams.
31+
5. Create a Team called `labs` with `Dashboards` and `Alerts` enabled. See [here](docs/for-ops/console/teams.md) how to create Teams.
3032

31-
4. A user account is created and added to the `labs` Team. In the labs we'll be using the user `[email protected]`. See [here](docs/for-ops/console/usermgnt.md) how to create users and assign them to Teams.
33+
6. Create a user and make this user a member of the `labs` Team. In the labs we'll be using the user `[email protected]`. See [here](docs/for-ops/console/usermgnt.md) how to create users and assign them to Teams.
3234

33-
:::note
34-
An organization in Gitea is automatically created for each Team. Only members of the Team are added to the `Owners` group of this organization. When using the `platform-admin` account, make sure to add your account to the `Owners` group of the Team's organization in Gitea.
35+
:::info
36+
The App Platform will automatically create an organization for each Team in Gitea. Only members of the Team are added to the `Owners` group of this organization. It is possible to go through the labs using the (default) `platform-admin` user account that was created during the installation of the App Platform. When using the `platform-admin` user, then make sure to add your account to the `Owners` group of the Team's organization in Gitea. Follow the instruction for adding the platform-admin user to the Owners group of a Team's organization in Gitea [here](../../for-ops/how-to/make-owner-in-gitea.md)
3537
:::
3638

37-
5. The Kube API URL has been added to the [Cluster Settings](../../for-ops/console/settings/cluster.md). Select the `platform` view and click on `Settings` in the left menu. Then click on `Cluster`. When using LKE: You can find the Kube API URL in the Summary of your LKE cluster. Here it is called the `Kubernetes API Endpoint`. You can remove `:443` at the end.
39+
6. Add the Kube API to the [Cluster Settings](../../for-ops/console/settings/cluster.md). Select the `platform` view and click on `Settings` in the left menu. Then click on `Cluster`. When using LKE: You can find the Kube API URL in the Summary of your LKE cluster. Here it is called the `Kubernetes API Endpoint`. You can remove `:443` at the end.
3840

39-
## Sign in to the Console
41+
## Start with the labs
4042

41-
- Go to the provided URL. The URL will look like this: https://console.yourdomain.com
43+
- Go to https://console.yourdomain.com.
4244

43-
- Sign in with the created user account.
45+
- Sign in with the created user account ([email protected]) and change the initial password.
4446

4547
After sign in, you will see this page (with Dashboards enabled):
4648

4749
![Team dashboard](../../img/team-dashboard.png)
50+
51+
- Start with the [first lab](create-repos.md) to create a code repository in Gitea (the self-hosted Git service in the App Platform).

docs/get-started/labs/scan-images.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,13 @@ title: Scan your images for vulnerabilities
44
sidebar_label: Scan Images
55
---
66

7+
:::info
8+
This lab requires a user with the `platform-administrator` role!
9+
:::
10+
711
## Prerequisites
812

9-
To automatically scan images for vulnerabilities, `Automatically scan images on push` in the Team project settings in Harbor needs to be enabled by the platform administrator:
13+
To automatically scan images for vulnerabilities, `Automatically scan images on push` in the Team project settings in Harbor needs to be enabled by a user with the `platform-administrator` role:
1014

1115
![image vulnerabilities](../../img/harbor-config.png)
1216

docs/get-started/labs/use-otel.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,15 @@ title: OpenTelemetry
44
sidebar_label: Use OpenTelemery
55
---
66

7+
:::info
8+
This lab requires a user with the `platform-administrator` role!
9+
:::
10+
711
In order to make a system observable, it must be instrumented. Language specific implementation of OpenTelemetry provides a way to instrument your application without touching your source code. In this lab we're going to instrument a Java application.
812

913
## Prerequisites
1014

11-
Make sure the following Apps are enabled:
15+
Make sure the following Apps are enabled on the platform (requires a user with the `platform-administrator` role):
1216

1317
- `Tempo` on Platform
1418
- `Otel` on Platform
@@ -41,6 +45,10 @@ Setting the `samplingRatio` to `100` is only done for this lab to make sure all
4145

4246
7. Repeat step 2 to 6 for the `ingress-nginx-platform` app.
4347

48+
:::note
49+
Sometimes instrumenting the nginx-ingress controller requires a restart of the pods. Restart the `ingress-nginx-platform-controller` Pod if you don't see any traces from nginx.
50+
:::
51+
4452
## Build an image from source code
4553

4654
For this lab we're going to use the [Spring PetClinic Sample Application](https://github.com/spring-projects/spring-petclinic). Follow these steps to build an image from source code:

docs/get-started/labs/view-metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar_label: View Container Metrics
55
---
66

77
:::info
8-
Prometheus and Grafana for the Team need to be activated for this lab.
8+
Prometheus on the Platform and Dashboards for the Team need to be enabled
99
:::
1010

1111
When your application is deployed, you would of course like to be able to see container metrics for debugging purposes. Prometheus is used for collecting metrics. When Prometheus is enabled on the platform level and Grafana is enabled for the Team, general container metrics (provided by the Platform Prometheus) can be used in Grafana dashboards.

sidebar-docs.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,13 +112,13 @@ module.exports = {
112112
"for-ops/how-to/overview",
113113
"for-ops/how-to/use-catalog",
114114
"for-ops/how-to/ingress-classes",
115-
"for-ops/how-to/use-team-admin",
116115
"for-ops/how-to/backups",
117116
"for-ops/how-to/clone-apl",
118117
"for-ops/how-to/manage-age",
119118
"for-ops/how-to/change-admin-password",
120119
"for-ops/how-to/change-user-passwords",
121120
"for-ops/how-to/use-the-cli",
121+
"for-ops/how-to/make-owner-in-gitea",
122122
],
123123
},
124124
{

0 commit comments

Comments
 (0)