This is a cache of https://docs.openshift.com/rosa/service_mesh/v2x/ossm-profiles-users.html. It is a snapshot of the page at 2024-11-22T03:23:18.258+0000.
Managing users and profiles - <strong>service</strong> Mesh 2.x | <strong>service</strong> Mesh | Red Hat OpenShift <strong>service</strong> on AWS
×

Creating the Red Hat OpenShift service Mesh members

serviceMeshMember resources provide a way for Red Hat OpenShift service Mesh administrators to delegate permissions to add projects to a service mesh, even when the respective users do not have direct access to the service mesh project or member roll. While project administrators are automatically given permission to create the serviceMeshMember resource in their project, they cannot point it to any serviceMeshControlPlane until the service mesh administrator explicitly grants access to the service mesh. Administrators can grant users permissions to access the mesh by granting them the mesh-user user role. In this example, istio-system is the name of the service Mesh control plane project.

$ oc policy add-role-to-user -n istio-system --role-namespace istio-system mesh-user <user_name>

Administrators can modify the mesh-user role binding in the service Mesh control plane project to specify the users and groups that are granted access. The serviceMeshMember adds the project to the serviceMeshMemberRoll within the service Mesh control plane project that it references.

apiVersion: maistra.io/v1
kind: serviceMeshMember
metadata:
  name: default
spec:
  controlPlaneRef:
    namespace: istio-system
    name: basic

The mesh-users role binding is created automatically after the administrator creates the serviceMeshControlPlane resource. An administrator can use the following command to add a role to a user.

$ oc policy add-role-to-user

The administrator can also create the mesh-user role binding before the administrator creates the serviceMeshControlPlane resource. For example, the administrator can create it in the same oc apply operation as the serviceMeshControlPlane resource.

This example adds a role binding for alice:

apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
  namespace: istio-system
  name: mesh-users
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: Role
  name: mesh-user
subjects:
- apiGroup: rbac.authorization.k8s.io
  kind: User
  name: alice

Creating service Mesh control plane profiles

You can create reusable configurations with serviceMeshControlPlane profiles. Individual users can extend the profiles they create with their own configurations. Profiles can also inherit configuration information from other profiles. For example, you can create an accounting control plane for the accounting team and a marketing control plane for the marketing team. If you create a development template and a production template, members of the marketing team and the accounting team can extend the development and production profiles with team-specific customization.

When you configure service Mesh control plane profiles, which follow the same syntax as the serviceMeshControlPlane, users inherit settings in a hierarchical fashion. The Operator is delivered with a default profile with default settings for Red Hat OpenShift service Mesh.

Creating the ConfigMap

To add custom profiles, you must create a ConfigMap named smcp-templates in the openshift-operators project. The Operator container automatically mounts the ConfigMap.

Prerequisites
  • An installed, verified service Mesh Operator.

  • An account with the cluster-admin role. If you use Red Hat OpenShift Dedicated, you must have an account with the dedicated-admin role.

  • Location of the Operator deployment.

  • Access to the OpenShift CLI (oc).

Procedure
  1. Log in to the Red Hat OpenShift service on AWS CLI as a cluster-admin. If you use Red Hat OpenShift Dedicated, you must have an account with the dedicated-admin role.

  2. From the CLI, run this command to create the ConfigMap named smcp-templates in the openshift-operators project and replace <profiles-directory> with the location of the serviceMeshControlPlane files on your local disk:

    $ oc create configmap --from-file=<profiles-directory> smcp-templates -n openshift-operators
  3. You can use the profiles parameter in the serviceMeshControlPlane to specify one or more templates.

      apiVersion: maistra.io/v2
      kind: serviceMeshControlPlane
      metadata:
        name: basic
      spec:
        profiles:
        - default

Setting the correct network policy

service Mesh creates network policies in the service Mesh control plane and member namespaces to allow traffic between them. Before you deploy, consider the following conditions to ensure the services in your service mesh that were previously exposed through an Red Hat OpenShift service on AWS route.

  • Traffic into the service mesh must always go through the ingress-gateway for Istio to work properly.

  • Deploy services external to the service mesh in separate namespaces that are not in any service mesh.

  • Non-mesh services that need to be deployed within a service mesh enlisted namespace should label their deployments maistra.io/expose-route: "true", which ensures Red Hat OpenShift service on AWS routes to these services still work.