You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Venona's agent is trying to load avaliables apis using api `/openapi/v2` endpoint
@@ -46,14 +44,25 @@ rules:
46
44
- get
47
45
```
48
46
49
-
50
-
51
-
52
-
53
-
54
47
#### Install on GCP
55
48
* Make sure your user has `Kubernetes Engine Cluster Admin` role in google console
56
-
* Bind your user with cluster-admin kubernetes clusterrole `kubectl create clusterrolebinding NAME --clusterrole cluster-admin --user YOUR_USER`
49
+
* Bind your user with cluster-admin kubernetes clusterrole
50
+
> `kubectl create clusterrolebinding NAME --clusterrole cluster-admin --user YOUR_USER`
51
+
52
+
#### Kubernetes RBAC
53
+
Installation of Venona on Kubernetes cluster installing 2 groups of objects,
54
+
Each one has own RBAC needs and therefore, created roles(and cluster-roles)
55
+
The resource descriptors are avaliable [here](https://github.com/codefresh-io/venona/tree/master/venonactl/templates/kubernetes)
56
+
List of the resources that will be created
57
+
* Agent (grouped by `/.*.venona.yaml/`)
58
+
* `service-account.venona.yaml` - The service account that the agent's pod will use at the end
59
+
* `cluster-role-binding.venona.yaml` - The agent discovering K8S apis by calling to `openapi/v2`, this ClusterRoleBinding binds bootstraped ClusterRole by Kubernetes `system:discovery` to `service-account.venona.yaml`. This role has only permissions to make a GET calls to non resources urls
60
+
* `role.venona.yaml` - Allow to GET, CREATE and DELETE pods and persistentvolumeclaims
61
+
* `role-binding.venona.yaml` - The agent is spinning up pods and pvc, this biniding binds `role.venona.yaml` to `service-account.venona.yaml`
62
+
* Runtime-environment (grouped by `/.*.re.yaml/`) Kubernetes controller that spins up all required resources to provide a good caching expirience during pipeline execution
63
+
* `service-account.dind-volume-provisioner.re.yaml` - The service account that the controller will use
64
+
* `cluster-role.dind-volume-provisioner.re.yaml` Defines all the permission needed for the controller to operate correctly
65
+
* `cluster-role-binding.dind-volume-provisioner.yaml` - Binds the ClusterRole to `service-account.dind-volume-provisioner.re.yaml`
57
66
58
67
#### Upgrade
59
68
To upgrade existing runtime-environment, a one that was created without Venona's agent, run:
0 commit comments