Skip to content

Commit 5f26559

Browse files
Kenny WoodsonMakdaam
authored andcommitted
Updated privileged container documentation
Added additional instructions regarding privileged container setup.
1 parent 40be28b commit 5f26559

File tree

1 file changed

+30
-12
lines changed

1 file changed

+30
-12
lines changed

articles/openshift/howto-run-privileged-containers.md

Lines changed: 30 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -23,39 +23,57 @@ Section titles in product-specific steps below refer directly to section titles
2323
## Before you begin
2424

2525
The documentation of most security products assumes you have cluster-admin privileges.
26-
Customer admins don't have all privileges in Azure Red Hat OpenShift. Permissions to modify cluster-wide resources are limited.
26+
Customer admins do not possess all privileges in Azure Red Hat OpenShift. Permissions required to modify cluster-wide resources are limited.
2727

28-
Make sure you're logged in to the cluster as a customer admin, by running
29-
`oc get scc`. All users in the customer admin group have permissions to view the Security Context Constraints (SCCs) on the cluster.
28+
First, ensure the user is logged in to the cluster as a customer admin, by running
29+
`oc get scc`. All users that are members of the customer admin group have permissions to view the Security Context Constraints (SCCs) on the cluster.
30+
31+
Next, ensure that the `oc` binary version is `3.11.154`.
32+
```
33+
oc version
34+
oc v3.11.154
35+
kubernetes v1.11.0+d4cacc0
36+
features: Basic-Auth GSSAPI Kerberos SPNEGO
37+
38+
Server https://openshift.aqua-test.osadev.cloud:443
39+
openshift v3.11.154
40+
kubernetes v1.11.0+d4cacc0
41+
```
3042

3143
## Product-specific steps for Aqua Security
32-
The base instructions we're going to modify can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/deploy-openshift).
44+
The base instructions that are are going to be modified can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/deploy-openshift). The steps here will run in conjunction to the Aqua deployment documentation.
3345

34-
The first step is to annotate the SCCs you're editing. These annotations will prevent the Sync Pod from reverting your changes.
46+
The first step is to annotate the required SCCs that will be updated. These annotations prevent the cluster's Sync Pod from reverting the any changes to these SSCs.
3547

3648
```
3749
oc annotate scc hostaccess openshift.io/reconcile-protect=true
3850
oc annotate scc privileged openshift.io/reconcile-protect=true
3951
```
4052

4153
### Step 1: Prepare prerequisites
42-
Remember to log in to the cluster as a user with ARO Customer Admin privileges instead of cluster-admin.
54+
Remember to log in to the cluster as a user with ARO Customer Admin privileges instead of the cluster-admin.
4355

4456
Create the project and the service account.
4557
```
4658
oc new-project aqua-security
4759
oc create serviceaccount aqua-account -n aqua-security
4860
```
4961

50-
Instead of assigning the cluster-reader role, assign the customer-admin-cluster role to the aqua-account.
62+
Instead of assigning the cluster-reader role, assign the customer-admin-cluster role to the aqua-account with the following command.
5163
```
5264
oc adm policy add-cluster-role-to-user customer-admin-cluster system:serviceaccount:aqua-security:aqua-account
65+
oc adm policy add-scc-to-user privileged system:serviceaccount:aqua-security:aqua-account
66+
oc adm policy add-scc-to-user hostaccess system:serviceaccount:aqua-security:aqua-account
5367
```
5468

55-
Follow the remaining instructions in Step 1.
69+
Continue following the remaining instructions in Step 1. This includes setting up the secret for the Aqua registry.
5670

5771
### Step 2: Deploy the Aqua Server, Database, and Gateway
58-
The only modification here is to replace the Route definition when editing the Aqua Console YAML file with the definition below
72+
Follow the steps provided in the Aqua documentation for installing the aqua-console.yaml.
73+
74+
This requires a modification to the provided `aqua-console.yaml`. Remove the top two objects labeled, `kind: ClusterRole` and `kind: ClusterRoleBinding`. These will fail during creation as the customer admin does not have permission at this time to modify `ClusterRole` and `ClusterRoleBinding` objects.
75+
76+
The second modification will be to the `kind: Route` portion of the `aqua-console.yaml`. Substitute the following yaml for the `kind: Route` object in the provided yaml.
5977
```
6078
apiVersion: route.openshift.io/v1
6179
kind: Route
@@ -80,9 +98,9 @@ spec:
8098
Follow the remaining instructions.
8199

82100
### Step 3: Login to the Aqua Server
83-
This section isn't modified in any way.
101+
This section isn't modified in any way. Follow the Aqua documentation.
84102

85-
You can use this command to get the Aqua Console address.
103+
Use the following command to get the Aqua Console address.
86104
```
87105
oc get route aqua-web -n aqua-security
88106
```
@@ -110,7 +128,7 @@ You can follow the documentation until the "Install Console" section, use the Pr
110128
### Install Console
111129

112130
During `oc create -f twistlock_console.yaml` in Step 2, you'll get an Error when creating the namespace.
113-
You can safely ignore it, the namespace has been created with the `oc new-project` command.
131+
You can safely ignore it, the namespace has been created previoussly with the `oc new-project` command.
114132

115133
### Create an external route to Console
116134

0 commit comments

Comments
 (0)