You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/howto-run-privileged-containers.md
+30-12Lines changed: 30 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,39 +23,57 @@ Section titles in product-specific steps below refer directly to section titles
23
23
## Before you begin
24
24
25
25
The documentation of most security products assumes you have cluster-admin privileges.
26
-
Customer admins don't have all privileges in Azure Red Hat OpenShift. Permissions to modify cluster-wide resources are limited.
26
+
Customer admins do not possess all privileges in Azure Red Hat OpenShift. Permissions required to modify cluster-wide resources are limited.
27
27
28
-
Make sure you're logged in to the cluster as a customer admin, by running
29
-
`oc get scc`. All users in the customer admin group have permissions to view the Security Context Constraints (SCCs) on the cluster.
28
+
First, ensure the user is logged in to the cluster as a customer admin, by running
29
+
`oc get scc`. All users that are members of the customer admin group have permissions to view the Security Context Constraints (SCCs) on the cluster.
30
+
31
+
Next, ensure that the `oc` binary version is `3.11.154`.
32
+
```
33
+
oc version
34
+
oc v3.11.154
35
+
kubernetes v1.11.0+d4cacc0
36
+
features: Basic-Auth GSSAPI Kerberos SPNEGO
37
+
38
+
Server https://openshift.aqua-test.osadev.cloud:443
39
+
openshift v3.11.154
40
+
kubernetes v1.11.0+d4cacc0
41
+
```
30
42
31
43
## Product-specific steps for Aqua Security
32
-
The base instructions we're going to modify can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/deploy-openshift).
44
+
The base instructions that are are going to be modified can be found in the [Aqua Security deployment documentation](https://docs.aquasec.com/docs/deploy-openshift). The steps here will run in conjunction to the Aqua deployment documentation.
33
45
34
-
The first step is to annotate the SCCs you're editing. These annotations will prevent the Sync Pod from reverting your changes.
46
+
The first step is to annotate the required SCCs that will be updated. These annotations prevent the cluster's Sync Pod from reverting the any changes to these SSCs.
Continue following the remaining instructions in Step 1. This includes setting up the secret for the Aqua registry.
56
70
57
71
### Step 2: Deploy the Aqua Server, Database, and Gateway
58
-
The only modification here is to replace the Route definition when editing the Aqua Console YAML file with the definition below
72
+
Follow the steps provided in the Aqua documentation for installing the aqua-console.yaml.
73
+
74
+
This requires a modification to the provided `aqua-console.yaml`. Remove the top two objects labeled, `kind: ClusterRole` and `kind: ClusterRoleBinding`. These will fail during creation as the customer admin does not have permission at this time to modify `ClusterRole` and `ClusterRoleBinding` objects.
75
+
76
+
The second modification will be to the `kind: Route` portion of the `aqua-console.yaml`. Substitute the following yaml for the `kind: Route` object in the provided yaml.
59
77
```
60
78
apiVersion: route.openshift.io/v1
61
79
kind: Route
@@ -80,9 +98,9 @@ spec:
80
98
Follow the remaining instructions.
81
99
82
100
### Step 3: Login to the Aqua Server
83
-
This section isn't modified in any way.
101
+
This section isn't modified in any way. Follow the Aqua documentation.
84
102
85
-
You can use this command to get the Aqua Console address.
103
+
Use the following command to get the Aqua Console address.
86
104
```
87
105
oc get route aqua-web -n aqua-security
88
106
```
@@ -110,7 +128,7 @@ You can follow the documentation until the "Install Console" section, use the Pr
110
128
### Install Console
111
129
112
130
During `oc create -f twistlock_console.yaml` in Step 2, you'll get an Error when creating the namespace.
113
-
You can safely ignore it, the namespace has been created with the `oc new-project` command.
131
+
You can safely ignore it, the namespace has been created previoussly with the `oc new-project` command.
0 commit comments