Skip to content

Commit 662511b

Browse files
committed
added steps to configure argo cd rbac
added steps fixed build error made review changes made review changes made changes made review changes
1 parent 5ca3bf8 commit 662511b

File tree

4 files changed

+92
-0
lines changed

4 files changed

+92
-0
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1612,6 +1612,8 @@ Topics:
16121612
File: configuring-sso-on-argo-cd-using-dex
16131613
- Name: Configuring SSO for Argo CD using Keycloak
16141614
File: configuring-sso-for-argo-cd-using-keycloak
1615+
- Name: Configuring Argo CD RBAC
1616+
File: configuring-argo-cd-rbac
16151617
- Name: Running Control Plane Workloads on Infra nodes
16161618
File: run-gitops-control-plane-workload-on-infra-nodes
16171619
---
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
:_content-type: ASSEMBLY
2+
[id="configuring-argo-cd-rbac"]
3+
= Configuring Argo CD RBAC
4+
include::_attributes/common-attributes.adoc[]
5+
:context: configuring-argo-cd-rbac
6+
7+
toc::[]
8+
9+
[role="_abstract"]
10+
By default, if you are logged into Argo CD using RHSSO, you are a read-only user. You can change and manage the user level access.
11+
12+
include::modules/configuring-user-level-access.adoc[leveloffset=+1]
13+
include::modules/modify-rhsso-requests-limits.adoc[leveloffset=+1]
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
// Module is included in the following assemblies:
2+
//
3+
// * installing-red-hat-openshift-gitops
4+
5+
:_content-type: PROCEDURE
6+
[id="configuring-user-level-access_{context}"]
7+
= Configuring user level access
8+
9+
[role="_abstract"]
10+
To manage and modify the user level access, configure the RBAC section in Argo CD custom resource.
11+
12+
.Procedure
13+
14+
* Edit the `argocd` Custom Resource:
15+
+
16+
[source,terminal]
17+
----
18+
$ oc edit argocd [argocd-instance-name] -n [namespace]
19+
----
20+
.Output
21+
+
22+
[source,yaml]
23+
----
24+
metadata
25+
...
26+
...
27+
rbac:
28+
policy: 'g, rbacsystem:cluster-admins, role:admin'
29+
scopes: '[groups]'
30+
----
31+
+
32+
* Add the `policy` configuration to the `rbac` section and add the `name`, `email` and the `role` of the user:
33+
+
34+
[source,yaml]
35+
----
36+
metadata
37+
...
38+
...
39+
rbac:
40+
policy: <name>, <email>, role:<admin>
41+
scopes: '[groups]'
42+
----
43+
44+
[NOTE]
45+
====
46+
Currently, RHSSO cannot read the group information of {gitops-title} users. Therefore, configure the RBAC at the user level.
47+
====
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
// Module is included in the following assemblies:
2+
//
3+
// * installing-red-hat-openshift-gitops
4+
5+
:_content-type: PROCEDURE
6+
[id="modifying-rhsso-resource-requests-limits_{context}"]
7+
= Modifying RHSSO resource requests/limits
8+
9+
[role="_abstract"]
10+
By default, the RHSSO container is created with resource requests and limitations. You can change and manage the resource requests.
11+
12+
|===
13+
|*Resource* |*Requests* |*Limits*
14+
15+
|CPU|500|1000m
16+
|Memory|512 Mi|1024 Mi
17+
18+
|===
19+
.Procedure
20+
Modify the default resource requirements patching the Argo CD CR:
21+
22+
[source,terminal]
23+
----
24+
$ oc -n openshift-gitops patch argocd openshift-gitops --type='json' -p='[{"op": "add", "path": "/spec/sso", "value": {"provider": "keycloak", "resources": {"requests": {"cpu": "512m", "memory": "512Mi"}, "limits": {"cpu": "1024m", "memory": "1024Mi"}} }}]'
25+
----
26+
27+
[NOTE]
28+
====
29+
RHSSO created by the {gitops-title} only persists the changes that are made by the operator. If the RHSSO restarts, any additional configuration created by the Admin in RHSSO is deleted.
30+
====

0 commit comments

Comments
 (0)