Skip to content

Commit 8dd9834

Browse files
committed
CMP-1619 FIO updates
Engineering/QE feedback applied Peer review feedback added futher peer review feedback applied
1 parent 42b6692 commit 8dd9834

5 files changed

+58
-24
lines changed

modules/file-integrity-important-attributes.adoc

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,15 @@ a default toleration is applied, which allows tolerations to run on control plan
3232
checks on a node can be resource intensive, so it can be useful to specify a
3333
longer interval. Defaults to `900`, or 15 minutes.
3434

35-
|`spec.config.name`, `spec.config.namespace`, `spec.config.key`
36-
|These three attributes allow you to set a custom AIDE configuration. When the name
37-
or namespace are unset, the File Integrity Operator generates a configuration
38-
suitable for {op-system} systems. The name and namespace attributes point to the
39-
config map; the key points to a key inside that config map. Use the key
40-
attribute to specify a custom key that contains the actual config and defaults
41-
to `aide.conf`.
35+
|`maxBackups`
36+
|The maximum number of AIDE database and log backups leftover from the `re-init` process to keep on a node. Older backups beyond this number are automatically pruned by the daemon.
37+
38+
|`spec.config.name`
39+
| Name of a configMap that contains custom AIDE configuration. If omitted, a default configuration is created.
40+
41+
|`spec.config.namespace`
42+
|Namespace of a configMap that contains custom AIDE configuration. If unset, the FIO generates a default configuration suitable for {op-system} systems.
43+
44+
|`spec.config.key`
45+
|Key that contains actual AIDE configuration in a config map specified by `name` and `namespace`. The default value is `aide.conf`.
4246
|===

modules/file-integrity-operator-exploring-daemon-sets.adoc

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,27 +12,31 @@ To find the daemon set that represents a `FileIntegrity` object, run:
1212

1313
[source,terminal]
1414
----
15-
$ oc get ds/aide-ds-$file-integrity-object-name
15+
$ oc -n openshift-file-integrity get ds/aide-worker-fileintegrity
1616
----
1717

1818
To list the pods in that daemon set, run:
1919

2020
[source,terminal]
2121
----
22-
$ oc get pods -lapp=$ds-name
22+
$ oc -n openshift-file-integrity get pods -lapp=aide-worker-fileintegrity
2323
----
2424

2525
To view logs of a single AIDE pod, call `oc logs` on one of the pods.
2626

27+
[source,terminal]
28+
----
29+
$ oc -n openshift-file-integrity logs pod/aide-worker-fileintegrity-mr8x6
30+
----
31+
2732
.Example output
2833
[source,terminal]
2934
----
30-
debug: aide files locked by aideLoop
35+
Starting the AIDE runner daemon
36+
initializing AIDE db
37+
initialization finished
3138
running aide check
32-
aide check returned status 0
33-
debug: aide files unlocked by aideLoop
34-
debug: Getting FileIntegrity openshift-file-integrity/worker-fileintegrity
35-
Created OK configMap 'aide-ds-worker-fileintegrity-ip-10-0-128-73.eu-north-1.compute.internal'
39+
...
3640
----
3741

3842
The config maps created by the AIDE daemon are not retained and are deleted

modules/file-integrity-understanding-file-integrity-cr.adoc

Lines changed: 29 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,18 @@
22
//
33
// * security/file_integrity_operator/file-integrity-operator-understanding.adoc
44

5-
:_content-type: CONCEPT
5+
:_content-type: PROCEDURE
66
[id="understanding-file-integrity-custom-resource_{context}"]
7-
= Understanding the FileIntegrity custom resource
7+
= Creating the FileIntegrity custom resource
88

99
An instance of a `FileIntegrity` custom resource (CR) represents a set of continuous file integrity scans for one or more nodes.
1010

1111
Each `FileIntegrity` CR is backed by a daemon set running AIDE on the nodes matching the `FileIntegrity` CR specification.
1212

13-
The following example `FileIntegrity` CR enables scans on only the worker nodes, but otherwise uses the defaults.
13+
.Procedure
1414

15+
. Create the following example `FileIntegrity` CR named `worker-fileintegrity.yaml` to enable scans on worker nodes:
16+
+
1517
.Example FileIntegrity CR
1618
[source,yaml]
1719
----
@@ -25,3 +27,27 @@ spec:
2527
node-role.kubernetes.io/worker: ""
2628
config: {}
2729
----
30+
31+
. Apply the YAML file to the `openshift-file-integrity` namespace:
32+
+
33+
[source,terminal]
34+
----
35+
$ oc apply -f worker-fileintegrity.yaml -n openshift-file-integrity
36+
----
37+
38+
.Verification
39+
40+
* Confirm the `FileIntegrity` object was created successfully by running the following command:
41+
+
42+
[source,terminal]
43+
----
44+
$ oc get fileintegrities -n openshift-file-integrity
45+
----
46+
+
47+
.Example output
48+
+
49+
[source,terminal]
50+
----
51+
NAME AGE
52+
worker-fileintegrity 14s
53+
----

modules/file-integrity-understanding-file-integrity-node-statuses-object.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ worker-fileintegrity-ip-10-0-165-160.ec2.internal 102s
2424

2525
[NOTE]
2626
====
27-
The `FileIntegrityNodeStatus` object might not be created until the second run of the scanner is finished. The period is configurable.
27+
It might take some time for the `FileIntegrityNodeStatus` object results to be available.
2828
====
2929

3030
There is one result object per node. The `nodeName` attribute of each `FileIntegrityNodeStatus` object corresponds to the node being scanned. The

security/file_integrity_operator/file-integrity-operator-troubleshooting.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -54,14 +54,14 @@ Run:
5454
+
5555
[source,terminal]
5656
----
57-
$ oc get pods -lapp=aide-ds-$(<FIO_NAME>)
57+
$ oc -n openshift-file-integrity get pods -lapp=aide-worker-fileintegrity
5858
----
5959
+
60-
--
61-
* `FIO_NAME` is the name of the `FileIntegrity` object to get a list of the pods.
62-
* Adding `-owide` adds the IP address of the node the pod is running on.
63-
--
60+
[NOTE]
61+
====
62+
Adding `-owide` includes the IP address of the node that the pod is running on.
63+
====
6464
+
65-
To check the logs of the daemon pods, run `oc logs`
65+
To check the logs of the daemon pods, run `oc logs`.
6666
+
6767
Check the return value of the AIDE command to see if the check passed or failed.

0 commit comments

Comments
 (0)