Skip to content

Latest commit

 

History

History
 
 

locality-specific-policy

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

Locality Specific Policy

This example exhibits how to configure policy that applies only to resources in specific regions. We will create a RoleBinding named Auditor that only applies to clusters within a prescribed region.

locality-specific-policy

Contents

Prerequisites

Config Overview

This repository contains the following files.

locality-specific-policy/
├── setup/ # configuration for each cluster's ACM Operator
│   ├── belgium.config-management.yaml
│   ├── belgium-2.config-management.yaml
│   ├── iowa.config-management.yaml
|   └── taiwan.config-management.yaml
└── config-root/ # directory ACM monitors for policy
   ├── README.md
   ├── system/
   ├── namespaces/
   ├── cluster/ # cluster scoped objects
   │   ├──clusterrole.auditor.yaml  # uses location-belgium selector
   |   └── clusterrolebinding.auditor.yaml
   └── clusterregistry/ # defines selectors and cluster labels
       ├── cluster.belgium-2.yaml
       ├── cluster.belgium.yaml
       ├── cluster.iowa.yaml
       ├── cluster.taiwan.yaml
       ├── clusterregistry.select-location-belgium.yaml
       └── clusterregistry.select-prod.yaml

Setup

This example assumes you have four clusters with ACM installed and with read access to a fork of this repo.

To setup the clusters for this example you will need to:

Fork and clone this repo

  1. Fork this repo to your account

  2. In your terminal, clone this repo locally.

    $ git clone https://github.com/<GITHUB_USERNAME>/anthos-config-management-samples.git
    $ cd anthos-config-management-samples/

Configure ACM Operator with locality-specific-policy/

Each cluster's ACM operator must be configured to point to the config-root in locality-specific-policy/.

The setup directory and cluster configs for this example assumed the names "belgium", "belgium-2", "iowa" and "taiwan".

Each cluster has its own config in the [setup/] directory.

If you are not using default names of "belgium", "belgium-2", "iowa" and "taiwan", update the cluster's names in the spec.clusterName field.

  1. Update the files in setup/ to include your cluster names and git username. For example, if your github username is [email protected], change each YAML to include

    git:
      syncRepo: [email protected]:[email protected]/anthos-config-management-samples.git
  2. Sync the ACM Operator for both clusters by repeating the following steps for "belgium", "belgium-2", "iowa" and "taiwan" clusters.

    # Get kubeconfig credentials for your cluster
    $ gcloud container clusters get-credentials <cluster name> --zone <cluster zone>
    # Ensure kubectl is using correct context
    $ kubectl config get-context
    # Apply the configuration to your cluster
    $ kubectl apply -f setup/<cluster name>.config-management.yaml
  3. Confirm the sync was successful with nomos status

    $ nomos status
    Connecting to clusters...
    Context                                 Status           Last Synced Token
    -------                                 ------           -----------------
    belgium-cluster-context                 SYNCED           <some commit hash>
    belgium-2-cluster-context               SYNCED           <some commit hash>
    iowa-cluster-context                    SYNCED           <some commit hash>
    taiwan-cluster-context                  SYNCED           <some commit hash>

Update Cluster Configs

ClusterSelectors are used to rollout policy to specific clusters. For ClusterSelectors to work, clusters must be labeled with relevant metadata.

The Cluster configs are located in the clusterregistry/ directory.

ACM uses the metadata.name field to determine where ClusterSelectors apply.

If you are not using default names of "belgium", "belgium-2", "iowa" and "taiwan", update the cluster's names in the metadata.name field. Then push your changes to git for them to be picked up by ACM.

First, ensure your cluster configs are valid.

$ cd config-root/
$ nomos vet
# Commit and push changes to git
$ git add clusterregistry/
$ git commit -m "updated cluster configs to point to my clusters"
$ git push origin master

Define Policy as Config

This config creates a RoleBinding named auditor that only applies to clusters that are labelled "belgium".

ClusterSelectors and Cluster Configs

You use ClusterSelectors to rollout policy to specific clusters. ClusterSelectors limit which clusters a config applies to by checking the cluster's labels. Read more about ClusterSelectors here.

ClusterSelectors must reference labels associated with a cluster. You can specify these labels in a Cluster config.

ClusterSelectors and Cluster configs are stored in the clusterregistry/ directory.

Each Cluster config has a label that defines environment and location. The ClusterSelector "select-location-belgium" applies configs with the "location: belgium" label.

ClusterRole and ClusterRoleBinding

ClusterSelectors are referenced in config to limit the clusters they are applied to.

The ClusterRole "auditor" references "select-location-belgium" in the annotations.configmanagement.gke.io/cluster-selector field. The "auditor" role is created only in clusters with the "location: belgium" label. This will also apply to the ClusterRoleBinding "auditors".

Observe Enforcement Across Clusters

We are going to first verify that the "auditors" ClusterRoleBinding exists in clusters with a "location: belgium" label.

Repeat the following for both the "belgium" and "belgium-2" clusters.

  1. Ensure your kubectl context is pointing to a belgium cluster

    # update local kubeconfig to correct cluster
    $ gcloud container clusters get-credentials <belgium or belgium-2 cluster name> --zone <cluster zone>
    # ensure kubectl is using correct context
    $ kubectl config get-context
  2. Get ClusterRoleBinding with kubectl

    $ kubectl get clusterrolebinding auditors
    NAME         AGE
    auditors     5m

Next, let's verify that the "auditors" ClusterRoleBinding doesn't exist in clusters with different location labels. Repeat the following for both the "iowa" and "taiwan" clusters.

  1. Ensure your kubectl context is pointing to correct cluster

    # update local kubeconfig to correct cluster
    $ gcloud container clusters get-credentials <taiwan or iowa cluster name> --zone <cluster zone>
    # ensure kubectl is using correct context
    $ kubectl config get-context
  2. Get ClusterRoleBinding with kubectl

    $ kubectl get clusterrolebinding auditors
      Error from server (NotFound): clusterrolebindings.rbac.authorization.k8s.io "auditors" not found

By leveraging ClusterSelectors with RBAC, we have successfully rolled out config selectively based on location.