Module 3

Red Hat OpenShift container platform

In order to complete these steps, you must have a running OpenShift 4 cluster. In Getting Started, we listed prerequisites for this workshop and the steps found in Red Hat's Get started with OpenShift guide should be followed if you don't already have a cluster to work on.

You will need to install the OpenShift Container Platform command-line interface (CLI) before you continue.

Securing Kubernetes workloads

Authenticating to your cluster

Once you have installed the CLI, let's start with authenticating to our cluster:

oc login

Deploying the application

Next, we will create a project using the oc new-project command:

oc new-project demo

Next, create a new app with the oc new-app command. Here we will create our backend using the mongo container image and pass the --name parameter to name our app goof-mongo:

oc new-app mongo --name goof-mongo

Next, we can optionally watch the status bu running the oc logs command against our deployment configuration:

oc logs -f dc/goof-mongo

We can also optionally view the status of the service created by running the oc get svc command:

oc get svc goof-mongo

Now, we are ready to deploy our frontend application. Here we will do a few things:

  1. Pull the container image we previously pushed to our quay repository.

  2. Set the COMPONENT_BACKEND_HOST & COMPONENT_BACKEND_PORT to allow our frontend to talk to our backend.

oc new-app<QUAY_USER>/goof \
--name goof -e COMPONENT_BACKEND_HOST=goof-mongo \

We will also need to set an environment variable for our frontend app by running the oc set env command against our frontend deployment configuration.

oc set env dc/goof DOCKER=1

Similar to what we did for our backend, we can optionally run oc get svc to see the status of our frontend service.

oc get svc goof

Now that our frontend is deployed, we will need to expose this so that we can access our app from a web browser. For this, we will run the oc expose command against our frontend service.

oc expose svc/goof

Lastly, we will run oc get routes to get the URL which we will copy and paste into our browser.

oc get routes

You can see the results of these commands by logging into the OpenShift console and reviewing the Deployment Configs for your project.

Installing the Snyk controller with OpenShift 4 and OperatorHub

We mentioned in Getting Started that you will need to install the Snyk controller to your cluster. If you have not already done so, now is a good time to go through the steps documented in our guide.

Monitoring Kubernetes workloads

By logging into your Snyk account, you will be able to add Kubernetes workloads for security scanning. In this example, we are going to monitor our recently deployed goof application.

Once you Add selected workloads you will be taken back to the Projects page where you can see a high level overview of all imported projects including your Kubernetes application.

By clicking on the the demo/replicationcontroller/goof-1 project, you will see additional details specific to the application security configuration. In this example, we see a number of issues have been found.

As we now know, Kubernetes is not secure by default. It is beyond the scope of these exercises to provide a deep-dive on this topic, but detailed documentation on securing a cluster is readily available. Additional reading is recommended on configuring a security context for a pod, pod security policies, and setting capabilities for a container.