You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/guides/flows.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -20,10 +20,10 @@ ARCAD builder has a specific way it fetches source code from a repository before
20
20
21
21
In order for ARCAD Builder to successfully clone from the 'External source code Management' URL defined in the ARCAD application, the user profile that is running the ARCAD Builder job needs access to the repository URL.
22
22
23
-
* The `AGENSSHKEY` can be used to generate the keypair for the user running the ARCAD Builder job on IBM i. The standard directory for the public key is `/home/<user>/.ssh/id_rsa.pub`.
23
+
* The `AGENSSHKEY` can be used to generate the key pair for the user running the ARCAD Builder job on IBM i. The standard directory for the public key is `/home/<user>/.ssh/id_rsa.pub`.
24
24
* The generated public key must be added to a GitHub/Azure/BitBucket account that has access to the repository being used.
25
25
* The user who runs the ARCAD Builder job can be changed with the `CHGAFSSVR` command.
26
26
27
-
It is also possible to override the user used for the clone. If you head to the ARCAD Builder Web Interface and navigate to the application, under the build model it is possible to define a 'Build' login and password (an IBM i user profile) which will be used for this application. The user profile provided also needs an SSH keypair setup.
27
+
It is also possible to override the user used for the clone. If you head to the ARCAD Builder Web Interface and navigate to the application, under the build model it is possible to define a 'Build' login and password (an IBM i user profile) which will be used for this application. The user profile provided also needs an SSH key pair setup.
Copy file name to clipboardexpand all lines: docs/guides/openshift/local.md
+2-19
Original file line number
Diff line number
Diff line change
@@ -10,25 +10,8 @@ This guide exists for users who potentially have hardware available for OpenShif
10
10
11
11
## System requirements
12
12
13
-
Red Hat OpenShift Local at present is only supported on AMD64 and Intel 64 processor architectures. It has the following minimum hardware requirements:
13
+
Please see the official Red Hat documentation regarding system requirements: [Openshift Local System Requirements](https://access.redhat.com/documentation/en-us/red_hat_openshift_local/2.5/html/release_notes_and_known_issues/minimum-system-requirements_rn-ki)
14
14
15
-
- 4 physical CPU cores
16
-
- 9 GB of free memory
17
-
- 35 GB of storage space
18
-
19
-
And the following operating system requirements:
20
-
21
-
- Microsoft Windows 10 Fall Creators Update (version 1709) or later
22
-
- macOS 11 Big Sur or later
23
-
- The latest two Red Hat Enterprise Linux/CentOS 7, 8 and 9 minor releases and on the latest two stable Fedora releases.
24
-
25
-
**Note:**
26
-
27
-
The OpenShift Local requires these (above) minimum hardware resources to run the smallest OpenShift Container Platform. Some workloads may require more resources. We recommend the following resources for running OpenShift Local:
28
-
29
-
- 8 physical CPU cores
30
-
- 64 GB of free memory
31
-
- 256 GB of storage space
32
15
33
16
## Install Red Hat OpenShift Local
34
17
@@ -247,7 +230,7 @@ From OpenShift web console, locate the Merlin namespace, open the postgres pod t
247
230
* In the psql session, run the following command to create an empty merlindb database:
248
231
* `DROP DATABASE IF EXISTS merlindb WITH (FORCE);`
249
232
* `CREATE DATABASE merlindb;`
250
-
* Run `\q` to quit the psql sesison.
233
+
* Run `\q` to quit the psql session.
251
234
* In the Terminal, run `psql -f /tmp/merlindb_dumpfile -d merlindb` to restore the merlindb database.
252
235
253
236
Now, you can use admin user and password to access Merlin GUI and use the vault secret and token to unseal vault which you had already written down.
Copy file name to clipboardexpand all lines: docs/guides/openshift/merlininstall.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@ The admin user can be used to log in to the Merlin instance for first time setup
102
102
103
103
## Initializing the Vault
104
104
105
-
After Merlin has been installed, an admin will need to initialise the vault. The vault is used to securely store credentials and important information securely. When you initialise the vault, **be sure to store** the secrets and token that are provided by the UI. **These are required** during Merlin upgrades and any time the vault needs to be unsealed.
105
+
After Merlin has been installed, an admin will need to initialize the vault. The vault is used to securely store credentials and important information securely. When you initialize the vault, **be sure to store** the secrets and token that are provided by the UI. **These are required** during Merlin upgrades and any time the vault needs to be unsealed.
Copy file name to clipboardexpand all lines: docs/guides/overview/sandbox.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Merlin Test Drive
2
2
3
-
It is now possible to try Merlin (and all components) for a limited timeframe. Please reach out to your Seller to be nominated for participation.
3
+
It is now possible to try Merlin (and all components) for a limited timeframe. Please reach out to your seller to be nominated for participation.
4
4
5
5
The Merlin Test Drive environment provides access to:
6
6
@@ -16,7 +16,7 @@ With access to the Merlin Test Drive environment, this hands-on documentation ca
16
16
* A [self-guided tour](./workshop/readme.md) and sample code are provided
17
17
* Leverage, test, and / or demonstrate IBM i Merlin.
18
18
* The user is provided an OpenShift Merlin Workspace and a dedicated IBM i partition
19
-
* IBM Client Engineering for Systems team provides the infrastructure, IBM i Development provides the Merlin expertise, and you test-drive Merlin
19
+
* IBM Client Engineering for Systems team provides the infrastructure. IBM i Development provides the Merlin expertise. And you test-drive Merlin
20
20
21
21
#### Limitations
22
22
@@ -29,5 +29,5 @@ With access to the Merlin Test Drive environment, this hands-on documentation ca
29
29
* BP or IBM Sellers can engage with the submission of a Deal Support Request against a pre-sales opportunity.
30
30
* Clients should reach out to your Seller to be nominated for participation. Your Seller will submit a Deal Support Request for `Power IBM i Merlin TestDrive` via the Client Engineering engagement process.
Copy file name to clipboardexpand all lines: docs/guides/overview/security.md
+16-16
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ This topic provides security recommendations for setting up Data In Motion Encry
5
5
6
6
## Data at rest
7
7
8
-
All user sensitive data at rest is stored in Hashicorp Vault. Hashicorp Vault is used to secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Merlin leverages HashiCorp Vault as the Active Encryption solution to store sensitive data such as credentials. Users do not need to directly work with HashiCorp Vault. Vault encrypts data in transit (with TLS) and at rest (using AES 256-bit CBC encryption). This protects sensitive data from unauthorized access in two major ways: as it travels across the network as well as in storage in the cloud and datacenters. But it is neccessary for OpenShift administrator to understand that Vault is used underneath. For more information, please read the content of the following link: https://learn.hashicorp.com/vault.
8
+
All user sensitive data at rest is stored in Hashicorp Vault. Hashicorp Vault is used to secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Merlin leverages HashiCorp Vault as the Active Encryption solution to store sensitive data such as credentials. Users do not need to directly work with HashiCorp Vault. Vault encrypts data in transit (with TLS) and at rest (using AES 256-bit CBC encryption). This protects sensitive data from unauthorized access in two major ways: as it travels across the network as well as in storage in the cloud and data centers. But it is necessary for OpenShift administrator to understand that Vault is used underneath. For more information, please read the content of the following link: https://learn.hashicorp.com/vault.
9
9
10
10
## Data in motion
11
11
Data in motion is encrypted using transport layer security (TLS 1.2) to secure all inbound and outbound requests from Merlin.
@@ -15,23 +15,23 @@ Network Policies are an application-centric construct which allow Merlin to spec
15
15
16
16
Four Network Policies are created by Merlin
17
17
* engine - defines that 'engine-0' pod is only allowed to be accessed by other pods, which are in the same namespace and owned by same Merlin instance, and the workspaces created by the same Merlin instance.
18
-
* postgres - defines that the 'postgres-0' can only be accessed by engine, vault, keycloak pods in the same namespace.
19
-
* keycloak - defines that the 'keycloak-0' can only be accessed by engine, vault pods in the same namespace.
20
-
* vault - defines that the 'vault-0' can only be accessed by engine pod in the same namespace.
18
+
* postgres - defines that the 'postgres-0' can only be accessed by the engine, vault, and keycloak pods in the same namespace.
19
+
* keycloak - defines that the 'keycloak-0' can only be accessed by the engine, and vault pods in the same namespace.
20
+
* vault - defines that the 'vault-0' can only be accessed by the engine pod in the same namespace.
21
21
22
22
## Manage certificate for Merlin
23
23
Merlin uses cert-manager to manage all the certifications.
24
24
For more information refer to https://www.ibm.com/docs/en/cloud-paks/cp-management/1.2.0?topic=management-certificate-manager-cert-manager
25
25
26
-
Merlin first creates a SelfSigned issuer resource, the SelfSigned issuer is for initially bootstrapping a CA issuer. Then issue a root certificate and use that root as a CA issuer.
27
-
The CA issuer will sign Merlin services certificate based on the private key.
26
+
Merlin first creates a SelfSigned issuer resource. The SelfSigned issuer is for initially bootstrapping a CA issuer. Then it issues a root certificate and uses that root as a CA issuer.
27
+
The CA issuer will sign the Merlin services certificate based on the private key.
28
28
29
-
The CA certificate stored in secret merlin-ca-secret, and the Merlin services certificate stored in secret merlin-https-cert.
29
+
The CA certificate is stored in the secret merlin-ca-secret, and the Merlin services certificate is stored in the secret merlin-https-cert.
30
30
31
-
Merlin external routes are re-encrypt secured routes, see https://docs.openshift.com/container-platform/4.10/networking/routes/secured-routes.html for more detail about secured route. The route resource is using the Openshift default ingress certificate and reencrypt TLS termination to destination CA certificate to enable the Ingress Controller to trust the service’s certificate.
31
+
Merlin external routes are re-encrypt secured routes, see https://docs.openshift.com/container-platform/4.10/networking/routes/secured-routes.html for more detail about secured routes. The route resource is using the Openshift default ingress certificate and the reencrypt TLS termination to destination CA certificate to enable the Ingress Controller to trust the service’s certificate.
32
32
33
-
There 2 steps to do if you want to use custom certificate both for Merlin services and routes:
34
-
1. To use a custom certificate for Merlin services, manually create the merlin-ca-secret which contains the TLS key and certificate under the same namespace within Merlin before installing the Merlin. When installing Merlin, Merlin will not create the root CA but use the custom one as the root CA to sign the Merlin services certificate.
33
+
There are two steps to do if you want to use a custom certificate for both Merlin services and routes:
34
+
1. To use a custom certificate for Merlin services, manually create the merlin-ca-secret which contains the TLS key and certificate under the same namespace within Merlin before installing Merlin. When installing Merlin, Merlin will not create the root CA but instead it will use the custom one as the root CA to sign the Merlin services certificate.
35
35
36
36
Use the following oc admin command to create the secret:
37
37
@@ -45,7 +45,7 @@ There 2 steps to do if you want to use custom certificate both for Merlin servic
45
45
**Note**: This will replace the Openshift cluster default certificate.
46
46
47
47
## Manage Merlin secrets
48
-
There are several secrects created when Merlin platform has been deployed. The key secrects are listed as follows:
48
+
There are several secrets created when Merlin platform has been deployed. The key secrets are listed as follows:
49
49
* merlin-ca-secret
50
50
* merlin-credential-secret
51
51
* merlin-https-cert
@@ -56,21 +56,21 @@ There are several secrects created when Merlin platform has been deployed. The k
56
56
### Customer Image Verification
57
57
**Important**: Customer verification of container image signatures is not required at this point in time. This documentation will provide a way for teams to enable their customers to verify the image signatures, but the customer can chose not to run the verification.
58
58
59
-
After the customer downloads the images to their Bastion server, they must do image signature verification before they transfer the downloaded images to their disconnected network. Customers have the option to disable image signature verification, but this is a customer specific setting. There are a few different options that can be used to verify the image signature, depending on the tooling the customer has, and this section will provide some examples and guidance around verifying the image signature. For more detailed signature verification documentation visit the IBM CISO Code Sign Service Documentation.
59
+
After the customer downloads the images to their bastion server, they must do image signature verification before they transfer the downloaded images to their disconnected network. Customers have the option to disable image signature verification, but this is a customer specific setting. There are a few different options that can be used to verify the image signature, depending on the tooling the customer has, and this section will provide some examples and guidance around verifying the image signature. For more detailed signature verification documentation, visit the IBM CISO Code Sign Service Documentation.
60
60
61
61
### Enabling Customers to Verify the Image Signature
62
62
The customer needs access to the public portion of the pgp key used to sign the image, in order to verify the image signature of the downloaded image. The ```$ucl pgp-key -n <alias>``` command will export the pgp key to your gpg key ring. The private portion of this key will be a pointer to the HSM where the actual key data is stored, and the public portion will be readily available in the key ring. This public key data will need to be provided to the customer, in order for them to verify the image signature. The way a customer gets this public key data MUST be declared in the product offering's README file or Knowledge Center.
63
63
64
64
### Portieris
65
-
Portieris is the open source version of CISE, which is an admission controller for Kubernetes. Portieris is being enhanced to support Red Hat signed image verification, and this will work out of the box on Red Hat OpenShift. The admission controller will be installed to the cluster, and only allow images it can verify to be spun up and ran inside your cluster.
65
+
Portieris is the open source version of CISE, which is an admission controller for Kubernetes. Portieris is being enhanced to support Red Hat signed image verification, and this will work out of the box on Red Hat OpenShift. The admission controller will be installed to the cluster, and only allow images it can verify to be spun up and run inside your cluster.
66
66
67
67
### OCP Verification
68
68
69
69
OCP verification is verification using any tool that relies on the atomic framework like: ```skopeo```, ```podman```, or ```oc```.
70
70
71
71
In OCP 4, signature validation for Red Hat signed images comes automatically when the image is pulled to the platform. The /etc/containers/policy.json file is what drives the verification of image signatures in OCP. Follow these steps to configure automatic signature verification on OCP 4:
72
72
73
-
**Note**: If the customer wants to take advantage of this feature for oc image, then the public key for your offering must be imported to the disk of the machines for the cluster
73
+
**Note**: If the customer wants to take advantage of this feature for the oc image, then the public key for your offering must be imported to the disk of the machines for the cluster
74
74
75
75
1. Configure client to read from the entitled registry
76
76
2. Create the necessary configuration files
@@ -80,13 +80,13 @@ In OCP 4, signature validation for Red Hat signed images comes automatically whe
80
80
4. Create a machine config that will write those files to disk on the worker nodes
81
81
5. Apply the machine config yaml to the cluster
82
82
6. Repeat for the master nodes
83
-
7. Verify the changes took place by describing themachine configs, refer to https://docs.openshift.com/container-platform/4.9/security/container_security/security-container-signature.html
83
+
7. Verify the changes took place by describing the machine configs, refer to https://docs.openshift.com/container-platform/4.9/security/container_security/security-container-signature.html
84
84
85
85
### Configure client to read from the entitled registry
86
86
87
87
In order to configure the client binary to read from the entitled registry, there must be credentials provided to the docker config file ```$HOME/.docker/config.json```.
88
88
89
-
Note: If using ```podmanto``` do the image pull and verification, then a ```$podman login``` to the entitled registry is all that is required to provide the necessary auth information.
89
+
Note: If using ```podman``` to perform the image pull and verification, then a ```podman login``` to the entitled registry is all that is required to provide the necessary auth information.
0 commit comments