Skip to content

Commit c7ac5d6

Browse files
committed
TELCODOCS-2171#Remove refs to telco in Day2Ops Security files and file names
1 parent 5bb0ced commit c7ac5d6

22 files changed

+353
-175
lines changed
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="security-basics"]
3+
= Security basics
4+
include::_attributes/common-attributes.adoc[]
5+
:context: security-basics
6+
7+
toc::[]
8+
9+
Security is a critical component of {product-title} deployments , particularly when running cloud-native applications.
10+
11+
You can enhance security for high-bandwidth network deployments by following key security considerations. By implementing these standards and best practices, you can strengthen security in most use cases.
12+
13+
include::modules/security-rbac-overview.adoc[leveloffset=+1]
14+
15+
[role="_additional-resources"]
16+
.Additional resources
17+
18+
* link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
19+
20+
include::modules/security-sec-accounts-overview.adoc[leveloffset=+1]
21+
22+
[role="_additional-resources"]
23+
.Additional resources
24+
25+
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-and-creating-service-accounts.html[Understanding and creating service accounts]
26+
27+
include::modules/security-identity-prov-config.adoc[leveloffset=+1]
28+
29+
[role="_additional-resources"]
30+
.Additional resources
31+
32+
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-identity-provider.html[Understanding identity provider configuration]
33+
34+
include::modules/security-replacing-kubeadmin-user.adoc[leveloffset=+1]
35+
36+
[role="_additional-resources"]
37+
.Additional resources
38+
39+
* link:https://docs.openshift.com/container-platform/4.17/authentication/identity_providers/configuring-htpasswd-identity-provider.html#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[About htpasswd authentication]
40+
41+
include::modules/security-sec-considerations-telco.adoc[leveloffset=+1]
42+
43+
include::modules/security-pod-sec-in-kub-and-ocp.adoc[leveloffset=+1]
44+
45+
include::modules/security-infra.adoc[leveloffset=+1]
46+
47+
include::modules/security-lifecycle-mgmnt.adoc[leveloffset=+1]
48+
49+
[role="_additional-resources"]
50+
.Additional resources
51+
52+
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/updating/update-welcome.html[Upgrading a telco core CNF clusters]
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="security-host-sec"]
3+
= Host security
4+
include::_attributes/common-attributes.adoc[]
5+
:context: security-host-sec
6+
7+
toc::[]
8+
9+
include::modules/security-rhcos-overview.adoc[leveloffset=+1]
10+
11+
[role="_additional-resources"]
12+
.Additional resources
13+
14+
* link:https://docs.openshift.com/container-platform/4.17/architecture/architecture-rhcos.html#rhcos-about_architecture-rhcos[About RHCOS]
15+
16+
* link:https://docs.openshift.com/container-platform/4.17/architecture/architecture-rhcos.html[Red Hat Enterprise Linux CoreOS (RHCOS)].
17+
18+
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/security/security-host-sec.html#security-linux-capabilities-overview_security-host-sec[Linux capabilities].
19+
20+
include::modules/security-command-line-host-access.adoc[leveloffset=+1]
21+
22+
[role="_additional-resources"]
23+
.Additional resources
24+
25+
* link:https://docs.openshift.com/container-platform/4.17/support/troubleshooting/investigating-pod-issues.html#starting-debug-pods-with-root-access_investigating-pod-issues[Starting debug pods with root access].
26+
27+
include::modules/security-linux-capabilities-overview.adoc[leveloffset=+1]

edge_computing/day_2_core_cnf_clusters/security/telco-security-sec-context-constraints.adoc renamed to edge_computing/day_2_core_cnf_clusters/security/security-sec-context-constraints.adoc

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
:_mod-docs-content-type: ASSEMBLY
2-
[id="telco-security-sec-context-constraints"]
2+
[id="security-sec-context-constraints"]
33
= Security context constraints
44
include::_attributes/common-attributes.adoc[]
5-
:context: telco-security-sec-context-constraints
5+
:context: security-sec-context-constraints
66
:imagesdir: images
77

88
toc::[]
@@ -26,13 +26,13 @@ Security context constraints allow an administrator to control the following sec
2626
2727
Default SCCs are created during installation and when you install some Operators or other components. As a cluster administrator, you can also create your own SCCs by using the OpenShift CLI (`oc`).
2828

29-
For information about default security context constraints, see xref:../../../authentication/managing-security-context-constraints.adoc#default-sccs_configuring-internal-oauth[Default security context constraints].
29+
For information about default security context constraints, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#default-sccs_configuring-internal-oauth[Default security context constraints].
3030

3131
[IMPORTANT]
3232
====
3333
Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or {product-title} is upgraded. Additionally, the default SCC values are reset to the defaults during some cluster upgrades, which discards all customizations to those SCCs.
3434
35-
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see xref:../../../authentication/managing-security-context-constraints.adoc#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
35+
Instead of modifying the default SCCs, create and modify your own SCCs as needed. For detailed steps, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html#security-context-constraints-creating_configuring-internal-oauth[Creating security context constraints].
3636
====
3737

3838
You can use the following basic SCCs:
@@ -43,10 +43,13 @@ You can use the following basic SCCs:
4343
The `restricted-v2` SCC is the most restrictive SCC provided by a new installation and is used by default for authenticated users. It aligns with Pod Security Admission (PSA) restrictions and improves security, as the original `restricted` SCC is less restrictive. It also helps transition from the original SCCs to v2 across multiple releases. Eventually, the original SCCs get deprecated. Therefore, it is recommended to use the `restricted-v2` SCC.
4444

4545
You can examine the `restricted-v2` SCC by running the following command:
46+
+
4647
[source,terminal]
4748
----
4849
$ oc describe scc restricted-v2
4950
----
51+
52+
+
5053
.Example output
5154
[source,terminal]
5255
----
@@ -93,4 +96,4 @@ The `restricted-v2` SCC explicitly denies everything except what it explicitly a
9396
* Allowed capabilities: `NET_BIND_SERVICE`. A pod can request this capability, but it is not added by default.
9497
* Allowed `seccomp` profiles: `runtime/default`.
9598
96-
For more information, see xref:../../../authentication/managing-security-context-constraints.adoc[Managing security context constraints].
99+
For more information, see link:https://docs.openshift.com/container-platform/4.17/authentication/managing-security-context-constraints.html[Managing security context constraints].

edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc

Lines changed: 0 additions & 56 deletions
This file was deleted.

edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc

Lines changed: 0 additions & 27 deletions
This file was deleted.

modules/security-basics.adoc

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="security-basics"]
3+
= Security basics
4+
include::_attributes/common-attributes.adoc[]
5+
:context: security-basics
6+
7+
toc::[]
8+
9+
Security is a critical component of {product-title} deployments , particularly when running cloud-native applications.
10+
11+
You can enhance security for high-bandwidth network deployments by following key security considerations. By implementing these standards and best practices, you can strengthen security in most use cases.
12+
13+
include::modules/security-rbac-overview.adoc[leveloffset=+1]
14+
15+
[role="_additional-resources"]
16+
.Additional resources
17+
18+
* link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
19+
20+
include::modules/security-sec-accounts-overview.adoc[leveloffset=+1]
21+
22+
[role="_additional-resources"]
23+
.Additional resources
24+
25+
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-and-creating-service-accounts.html[Understanding and creating service accounts]
26+
27+
include::modules/security-identity-prov-config.adoc[leveloffset=+1]
28+
29+
[role="_additional-resources"]
30+
.Additional resources
31+
32+
* link:https://docs.openshift.com/container-platform/4.17/authentication/understanding-identity-provider.html[Understanding identity provider configuration]
33+
34+
include::modules/security-replacing-kubeadmin-user.adoc[leveloffset=+1]
35+
36+
[role="_additional-resources"]
37+
.Additional resources
38+
39+
* link:https://docs.openshift.com/container-platform/4.17/authentication/identity_providers/configuring-htpasswd-identity-provider.html#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[About htpasswd authentication]
40+
41+
include::modules/security-sec-considerations-telco.adoc[leveloffset=+1]
42+
43+
include::modules/security-pod-sec-in-kub-and-ocp.adoc[leveloffset=+1]
44+
45+
include::modules/security-infra.adoc[leveloffset=+1]
46+
47+
include::modules/security-lifecycle-mgmnt.adoc[leveloffset=+1]
48+
49+
[role="_additional-resources"]
50+
.Additional resources
51+
52+
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/updating/update-welcome.html[Upgrading a telco core CNF clusters]

modules/telco-security-command-line-host-access.adoc renamed to modules/security-command-line-host-access.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
// Module included in the following assemblies:
22
//
3-
// * edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-host-sec.adoc
44

55
:_mod-docs-content-type: CONCEPT
6-
[id="telco-security-command-line-host-access_{context}"]
6+
[id="security-command-line-host-access_{context}"]
77
= Command-line host access
88

99
Direct access to a host must be restricted to avoid modifying the host or accessing pods that should not be accessed. For users who need direct access to a host, it is recommended to use an external authenticator, like SSSD with LDAP, to manage access. This helps maintain consistency across the cluster through the Machine Config Operator.

modules/security-host-sec.adoc

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="security-host-sec"]
3+
= Host security
4+
include::_attributes/common-attributes.adoc[]
5+
:context: security-host-sec
6+
7+
toc::[]
8+
9+
include::modules/security-rhcos-overview.adoc[leveloffset=+1]
10+
11+
[role="_additional-resources"]
12+
.Additional resources
13+
14+
* link:https://docs.openshift.com/container-platform/4.17/architecture/architecture-rhcos.html#rhcos-about_architecture-rhcos[About RHCOS]
15+
16+
* link:https://docs.openshift.com/container-platform/4.17/architecture/architecture-rhcos.html[Red Hat Enterprise Linux CoreOS (RHCOS)].
17+
18+
* link:https://docs.openshift.com/container-platform/4.17/edge_computing/day_2_core_cnf_clusters/security/security-host-sec.html#security-linux-capabilities-overview_security-host-sec[Linux capabilities].
19+
20+
include::modules/security-command-line-host-access.adoc[leveloffset=+1]
21+
22+
[role="_additional-resources"]
23+
.Additional resources
24+
25+
* link:https://docs.openshift.com/container-platform/4.17/support/troubleshooting/investigating-pod-issues.html#starting-debug-pods-with-root-access_investigating-pod-issues[Starting debug pods with root access].
26+
27+
include::modules/security-linux-capabilities-overview.adoc[leveloffset=+1]

modules/telco-security-identity-prov-config.adoc renamed to modules/security-identity-prov-config.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
// Module included in the following assemblies:
22
//
3-
// * edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc
44

55
:_mod-docs-content-type: CONCEPT
6-
[id="telco-security-identity-prov-config_{context}"]
6+
[id="security-identity-prov-config_{context}"]
77
= Identity provider configuration
88

99
Configuring an identity provider is the first step in setting up users on the cluster. You can manage groups at the organizational level by using an identity provider.

modules/security-infra.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc
4+
5+
:_mod-docs-content-type: CONCEPT
6+
[id="security-infra_{context}"]
7+
= Bare metal-based infrastructure
8+
9+
Hardware requirements:: In several industries, such as telco and finance, clusters are primarily built on bare-metal hardware. This means that the (op-system-first) operating system is installed directly on the physical machines, without using virtual machines. This reduces network connectivity complexity, minimizes latency, and optimizes CPU usage for applications.
10+
11+
Network requirements:: Networks in these industries sometimes require much higher bandwidth compared to standard IT networks. For example, Telco networks commonly use dual-port 25 GB connections or 100 GB network interface cards (NICs) to handle massive data throughput. Security is critical, requiring encrypted connections and secure endpoints to protect sensitive personal data.

0 commit comments

Comments
 (0)