Skip to content

validatedpatterns/layered-zero-trust

Repository files navigation

Layered Zero Trust

License

About the Layered Zero Trust Pattern

Showcases the Zero Trust capabilities across Red Hat's product portfolio in a reproducible manner.

Getting Started

The basis of this pattern leverages the foundation provided by the Multicloud GitOps Validated Pattern.

Prerequisites

  1. An OpenShift Cluster
  2. Validated Patterns Tooling

Prepare for Deployment

  1. From the layered-zero-trust repository on GitHub, click the Fork button.

  2. Clone the forked copy of this repository by running the following command.

    git clone [email protected]:<your-username>/layered-zero-trust.git
  3. Navigate to your repository: Ensure you are in the root directory of your Git repository by using:

    cd /path/to/your/repository
  4. Run the following command to set the upstream repository:

    git remote add -f upstream [email protected]/validatedpatterns/layered-zero-trust.git
  5. Verify the setup of your remote repositories by running the following command:

    git remote -v

    Example Output:

    origin  [email protected]:<your-username>/layered-zero-trust.git (fetch)
    origin  [email protected]:<your-username>/layered-zero-trust.git (push)
    upstream    https://github.com/validatedpatterns/layered-zero-trust.git (fetch)
    upstream    https://github.com/validatedpatterns/layered-zero-trust.git (push)
  6. Create a local copy of the secret values file that can safely include credentials. Run the following command :

    cp values-secret.yaml.template ~/values-secret-layered-zero-trust.yaml

    [!NOTE] Putting the values-secret.yaml in your home directory ensures that it does not get pushed to your Git repository. It is based on the values-secrets.yaml.template file provided by the pattern in the top level directory. When you create your own patterns you will add your secrets to this file and save. At the moment the focus is on getting started and familiar with this pattern.

  7. Create a new feature branch, for example my-branch from the main branch for your content:

    git checkout -b my-branch main
  8. Perform any desired changes to the Helm values files to customize the execution of the pattern (optional). Commit the changes

    git add <file(s)>
    git commit -m "Pattern customization"
  9. Push the changes in the branch to your forked repository

    git push origin my-branch

Deploy the pattern

The pattern.sh script is used to deploy the Layered Zero Trust Validated pattern.

  1. Login to your OpenShift cluster a. Obtain an API token by visiting https://oauth-openshift.apps../oauth/token/request. b. Log in with this retrieved token by running the following command:

    oc login --token=<retrieved-token> --server=https://api.<your-cluster>.<domain>:6443
  2. Alternatively log in by referencing an existing KUBECONFIG file:

    export KUBECONFIG=~/<path_to_kubeconfig>
  3. Deploy the pattern

    ./pattern.sh make install
  4. Verify the deployment a. To verify, in the OpenShift web console, navigate to Operators → Installed Operators page. b. Check that Red Hat OpenShift GitOps Operator is installed in the openshift-operators namespace and its status is Succeeded. c. Use the Application Selector (box with 9 squares) within the OpenShift console to confirm that all Applications have been synchronized successfully to both Hub and Cluster Argo CD instances.

About

Layered Zero Trust Validated Pattern

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 6