Skip to content

Commit d1e92a1

Browse files
authored
Merge pull request #95399 from wgabor0427/OSDOCS-15110
OSDOCS-15110 incorporated edits
2 parents 9db2d40 + c43ef63 commit d1e92a1

21 files changed

+183
-67
lines changed

_topic_maps/_topic_map.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1227,8 +1227,6 @@ Topics:
12271227
File: zero-trust-manager-overview
12281228
- Name: Zero Trust Workload Identity Manager release notes
12291229
File: zero-trust-manager-release-notes
1230-
- Name: Zero Trust Workload Identity Manager components and features
1231-
File: zero-trust-manager-features
12321230
- Name: Installing Zero Trust Workload Identity Manager
12331231
File: zero-trust-manager-install
12341232
- Name: Deploying Zero Trust Workload Identity Manager operands

modules/zero-trust-manager-about-agent.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44

55
:_mod-docs-content-type: CONCEPT
66
[id="zero-trust-manager-about-agent_{context}"]
7-
= SPIRE agent
7+
= SPIRE Agent
88

99
The SPIRE Agent is responsible for workload attestation, ensuring that workloads receive a verified identity when requesting authentication through the SPIFFE Workload API. It accomplishes this by using configured workload attestor plugins. In Kubernetes environments, the Kubernetes workload attestor plugin is used.
1010

11-
SPIRE and the SPIRE agent perform node attestation via node plugins. The plugins are used to verify the identity of the node on which the agent is running. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-agent[About the SPIRE Agent].
11+
SPIRE and the SPIRE Agent perform node attestation via node plugins. The plugins are used to verify the identity of the node on which the agent is running. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-agent[About the SPIRE Agent].
1212

modules/zero-trust-manager-about-attestation.adoc

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,10 @@
77
= Attestation
88

99

10-
Attestation is the process by which the identity of nodes and workloads are verified before SPIFFE IDs and SVIDs are issued. The SPIRE server gathers attributes of both the workload and node that the SPIRE Agent runs on, and then compares them to a set of selectors defined when the workload was registered. If the comparison is successful, the entities are provided with credentials. This ensures that only legitimate and expected entities within the trust domain receive cryptographic identities. The two main types of attestation in SPIFFE/SPIRE are:
10+
Attestation is the process by which the identity of nodes and workloads are verified before SPIFFE IDs and SVIDs are issued. The SPIRE Server gathers attributes of both the workload and node that the SPIRE Agent runs on, and then compares them to a set of selectors defined when the workload was registered. If the comparison is successful, the entities are provided with credentials. This ensures that only legitimate and expected entities within the trust domain receive cryptographic identities. The two main types of attestation in SPIFFE/SPIRE are:
1111

12-
* Node attestation: verifies the identity of a machine or a node on a system, before a SPIRE agent running on that node can be trusted to request identities for workloads.
13-
* Workload attestation: verifies the identity of an application or service running on an attested node before the SPIRE agent on that node can provide it with a SPIFFE ID and SVID.
12+
* Node attestation: verifies the identity of a machine or a node on a system, before a SPIRE Agent running on that node can be trusted to request identities for workloads.
13+
14+
* Workload attestation: verifies the identity of an application or service running on an attested node before the SPIRE Agent on that node can provide it with a SPIFFE ID and SVID.
1415
1516
For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#attestation[Attestation].

modules/zero-trust-manager-about-components.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ The SPIRE OpenID Connect Discovery Provider is a standalone component that makes
2323
[id="spire-controller-manager_{context}"]
2424
== SPIRE Controller Manager
2525

26-
The SPIRE Controller Manager uses custom resource definitions (CRDs) to facilitate the registration of workloads. To facilitate workload registration, the SPIRE Controller Manager registers controllers against pods and CRDs. When changes are detected on these resources, a workload reconciliation process is triggered. This process determines which SPIRE entries should exist based on the existing pods and CRDs. The reconciliation process creates, updates, and deletes entries on the SPIRE server as appropriate.
26+
The SPIRE Controller Manager uses custom resource definitions (CRDs) to facilitate the registration of workloads. To facilitate workload registration, the SPIRE Controller Manager registers controllers against pods and CRDs. When changes are detected on these resources, a workload reconciliation process is triggered. This process determines which SPIRE entries should exist based on the existing pods and CRDs. The reconciliation process creates, updates, and deletes entries on the SPIRE Server as appropriate.
2727

28-
The SPIRE Controller Manager is designed to be deployed on the same pod as the SPIRE server. The manager communicates with the SPIRE server API using a private UNIX Domain Socket within a shared volume.
28+
The SPIRE Controller Manager is designed to be deployed on the same pod as the SPIRE Server. The manager communicates with the SPIRE Server API using a private UNIX Domain Socket within a shared volume.
2929

3030

modules/zero-trust-manager-about-features.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@
77
= {zero-trust-full} features
88

99
[id="spire-telemetry_{context}"]
10-
== SPIRE server and agent telemetry
10+
== SPIRE Server and Agent telemetry
1111

12-
SPIRE server and agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, spire component performance, attestation and SVID issuance and plugin statistics.
12+
SPIRE Server and Agent telemetry provide insight into the health of the SPIRE deployment. The metrics are in the format provided by the Prometheus Operator. The metrics exposed help in understanding server health & lifecycle, SPIRE component performance, attestation and SVID issuance, and plugin statistics.

modules/zero-trust-manager-about-spire.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
:_mod-docs-content-type: CONCEPT
66
[id="zero-trust-manager-about-spire_{context}"]
7-
= SPIRE server
7+
= SPIRE Server
88

99

10-
A SPIRE server is responsible for managing and issuing SPIFFE identities within a trust domain. It stores registration entries (selectors that determine under what conditions a SPIFFE ID should be issued) and signing keys. The SPIRE server works in conjunction with the SPIRE agent to perform node attestion via node plugins. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-server[About the SPIRE server].
10+
A SPIRE Server is responsible for managing and issuing SPIFFE identities within a trust domain. It stores registration entries (selectors that determine under what conditions a SPIFFE ID should be issued) and signing keys. The SPIRE Server works in conjunction with the SPIRE Agent to perform node attestion via node plugins. For more information, see link:https://spiffe.io/docs/latest/spire-about/spire-concepts/#all-about-the-server[About the SPIRE Server].

modules/zero-trust-manager-enable-metrics-agent.adoc

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,25 @@
44

55
:_mod-docs-content-type: PROCEDURE
66
[id="zero-trust-manager-enable-metrics-agent_{context}"]
7-
= Configuring metrics collection for SPIRE agent by using a Service Monitor
7+
= Configuring metrics collection for SPIRE Agent by using a Service Monitor
88

9-
The SPIRE Agent operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Agent by creating a `ServiceMonitor` custom resource (CR), which enables Prometheus Operator to collect custom metrics.
9+
The SPIRE Agent operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Agent by creating a `ServiceMonitor` custom resource (CR), which enables the Prometheus Operator to collect custom metrics.
1010

1111
.Prerequisites
1212

1313
* You have access to the cluster as a user with the `cluster-admin` cluster role.
14+
1415
* You have installed the {zero-trust-full}.
16+
1517
* You have deployed the SPIRE Agent operand in the cluster.
18+
1619
* You have enabled the user workload monitoring.
1720
1821
.Procedure
1922

2023
. Create the `ServiceMonitor` CR:
2124

22-
.. Create the YAML file that defines `ServiceMonitor` CR:
25+
.. Create the YAML file that defines the `ServiceMonitor` CR:
2326
+
2427
.Example `servicemonitor-spire-agent.yaml` file
2528
[source,yaml]

modules/zero-trust-manager-enable-metrics-server.adoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,25 @@
44

55
:_mod-docs-content-type: PROCEDURE
66
[id="zero-trust-manager-enable-metrics-server_{context}"]
7-
= Configuring metrics collection for SPIRE server by using a Service Monitor
7+
= Configuring metrics collection for SPIRE Server by using a Service Monitor
88

9-
The SPIRE Server operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Server by creating a `ServiceMonitor` custom resource (CR) that enables Prometheus Operator to collect custom metrics.
9+
The SPIRE Server operand exposes metrics by default on port `9402` at the `/metrics` endpoint. You can configure metrics collection for the SPIRE Server by creating a `ServiceMonitor` custom resource (CR) that enables the Prometheus Operator to collect custom metrics.
1010

1111
.Prerequisites
1212

1313
* You have access to the cluster as a user with the `cluster-admin` cluster role.
14+
1415
* You have installed the {zero-trust-full}.
16+
1517
* You have deployed the SPIRE Server operand in the cluster.
18+
1619
* You have enabled the user workload monitoring.
1720
1821
.Procedure
1922

2023
. Create the `ServiceMonitor` CR:
2124

22-
.. Create the YAML file that defines `ServiceMonitor` CR:
25+
.. Create the YAML file that defines the `ServiceMonitor` CR:
2326
+
2427
.Example `servicemonitor-spire-server` file
2528
[source,yaml]
@@ -68,3 +71,4 @@ $ service=spire-server
6871
----
6972

7073
. Confirm that the *Status* column shows `Up` for the `spire-server-metrics` entry.
74+

modules/zero-trust-manager-how-it-works.adoc

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,40 +4,40 @@
44

55
:_mod-docs-content-type: CONCEPT
66
[id="zero-trust-manager-how-it-works_{context}"]
7-
== {zero-trust-full} workflow
7+
= About the {zero-trust-full} workflow
88

99

1010
The following is a high-level workflow of the {zero-trust-full} within the Red{nbsp}Hat OpenShift cluster.
1111

12-
. The SPIRE, SPIRE agent, SPIFFE CSI Driver, and the SPIRE OIDC Discovery Provider operands are deployed and managed by {zero-trust-full} via associated Customer Resource Definitions (CRDs).
12+
. The SPIRE, SPIRE Agent, SPIFFE CSI Driver, and the SPIRE OIDC Discovery Provider operands are deployed and managed by {zero-trust-full} via associated customer resource definitions (CRDs).
1313

1414
. Watches are then registered for relevant Kubernetes resources and the necessary SPIRE CRDs are applied to the cluster.
1515

1616
. The CR for the ZeroTrustWorkloadIdentityManager resource named `cluster` is deployed and managed by a controller.
1717

18-
. To deploy the SPIRE server, SPIRE agent, SPIFFE CSI Driver, and SPIRE OIDC Discovery Provider, you need to create a custom resource of a each certain type and name it `cluster`. The custom resource types are as follows:
18+
. To deploy the SPIRE Server, SPIRE Agent, SPIFFE CSI Driver, and SPIRE OIDC Discovery Provider, you need to create a custom resource of a each certain type and name it `cluster`. The custom resource types are as follows:
1919

20-
* SPIRE server - `SpireServer`
20+
* SPIRE Server - `SpireServer`
2121
22-
* SPIRE agent - `SpireAgent`
22+
* SPIRE Agent - `SpireAgent`
2323
2424
* SPIFFE CSI Driver - `SpiffeCSIDriver`
2525
2626
* SPIRE OIDC discovery provider - `SpireOIDCDiscoveryProvider`
2727
28-
. When a node starts, the SPIRE agent initializes, and connects to the SPIRE server.
28+
. When a node starts, the SPIRE Agent initializes, and connects to the SPIRE Server.
2929

30-
. The agent begins the node attestation process. The agent collects information on the node's identity such as label name and namespace. The agent securely provides the information it gathered through the attestation to the SPIRE server.
30+
. The SPIRE Agent begins the node attestation process. The agent collects information on the node's identity such as label name and namespace. The agent securely provides the information it gathered through the attestation to the SPIRE Server.
3131

32-
. The SPIRE server then evaluates this information against its configured attestation policies and registration entries. If successful, the server generates an agent SVID and the Trust Bundle (CA Certificate) and securely sends this back to the agent.
32+
. The SPIRE Server then evaluates this information against its configured attestation policies and registration entries. If successful, the server generates an agent SVID and the Trust Bundle (CA Certificate) and securely sends this back to the SPIRE Agent.
3333

3434
. A workload starts on the node and needs a secure identity. The workload connects to the agent's Workload API and requests a SVID.
3535

36-
. The agent receives the request and begins a workload attestation to gather information about the workload.
36+
. The SPIRE Agent receives the request and begins a workload attestation to gather information about the workload.
3737

38-
. After the agent gathers the information, the information is sent to the SPIRE server and the server checks its configured registration entries.
38+
. After the SPIRE Agent gathers the information, the information is sent to the SPIRE Server and the server checks its configured registration entries.
3939

40-
. The agent receives the workload SVID and Trust Bundle and passes it on to the workload. The workload can now present their SVIDs to other SPIFFE-aware devices to communicate with them.
40+
. The SPIRE Agent receives the workload SVID and Trust Bundle and passes it on to the workload. The workload can now present their SVIDs to other SPIFFE-aware devices to communicate with them.
4141

4242

4343
[role="_additional-resources"]

modules/zero-trust-manager-install-cli.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ $ oc create -f subscription.yaml
7373

7474
.Verification
7575

76-
. Verify that the OLM subscription is created by running the following command:
76+
* Verify that the OLM subscription is created by running the following command:
7777
+
7878
[source, terminal]
7979
----
@@ -87,7 +87,7 @@ NAME PACKAGE
8787
openshift-zero-trust-workload-identity-manager zero-trust-workload-identity-manager redhat-operators tech-preview-v0.1
8888
----
8989
90-
. Verify whether the Operator is successfully installed by running the following command:
90+
* Verify whether the Operator is successfully installed by running the following command:
9191
+
9292
[source, terminal]
9393
----
@@ -101,7 +101,7 @@ NAME DISPLAY
101101
zero-trust-workload-identity-manager.v0.1.0 Zero Trust Workload Identity Manager 0.1.0 Succeeded
102102
----
103103
104-
. Verify that the {zero-trust-full} controller manager is ready by running the following command:
104+
* Verify that the {zero-trust-full} controller manager is ready by running the following command:
105105
+
106106
[source, terminal]
107107
----

0 commit comments

Comments
 (0)