This commit is contained in:
dstrebel 2019-10-22 12:04:49 -05:00
Родитель a9e466d806 6b212ab213
Коммит 9c630b37fe
4 изменённых файлов: 28 добавлений и 4 удалений

Просмотреть файл

@ -1,6 +1,6 @@
# WORK IN PROGRESS
This repo is a work in progress.
This repo is a **WORK IN PROGRESS**.
# Cloud Native App Governance + Security Workshop
@ -23,6 +23,22 @@ The workshop runs over 2 days and is mean to take an outside in approach. Meanin
4. [Deploy Sample App](deploy-app/README.md)
5. [Validate Scenarios](validate-scenarios/README.md)
6. [Thought Leadership & Next Steps](thought-leadership/README.md)
## Prerequisites
The following are the requirements to **start**.
* Azure Account [Azure Portal](https://portal.azure.com)
* Azure CLI [Install CLI](https://docs.microsoft.com/en-us/cli/azure/install-azure-cli?view=azure-cli-latest)
* Kubectl CLI [Install kubectl with Azure CLI](https://docs.microsoft.com/en-us/azure/aks/kubernetes-walkthrough#connect-to-the-cluster)
* Git [Git SCM](https://git-scm.com/downloads)
* Terraform [Terraform Download](https://www.terraform.io/downloads.html)
* Docker Community Edition (CE)[Install CE](https://docs.docker.com/v17.09/engine/installation/)
* [Install Docker for Mac](https://docs.docker.com/v17.09/docker-for-mac/install/)
* [Install Docker for Windows](https://docs.docker.com/v17.09/docker-for-windows/install/)
* Code Editor [Install VS Code](https://code.visualstudio.com/download)
# Contributing

Просмотреть файл

@ -38,6 +38,11 @@ This section leverages the variables from above and creates the initial Resoruce
# Get ARM Access Token and Subscription ID - This will be used for AuthN later.
ACCESS_TOKEN=$(az account get-access-token -o tsv --query 'accessToken')
# NOTE: Update Subscription Name
# Use list command to get list of Subscription IDs & Names
az account list -o table
# Set Default Azure Subscription to be Used via Subscription ID
az account set -s <SUBSCRIPTION_ID_GOES_HERE>
# Put Subsc
SUBID=$(az account show -s '<SUBSCRIPTION_NAME_GOES_HERE>' -o tsv --query 'id')
# Create Resource Group
az group create --name $RG --location $LOC
@ -117,7 +122,6 @@ az extension add --name azure-firewall
# Create the Outbound Network Rule from Worker Nodes to Control Plane
az network firewall network-rule create -g $RG -f $FWNAME --collection-name 'aksfwnr' -n 'ssh' --protocols 'TCP' --source-addresses '*' --destination-addresses '*' --destination-ports 9000 443 --action allow --priority 100
az network firewall network-rule create -g $RG -f $FWNAME --collection-name 'aksfwnr2' -n 'dns' --protocols 'UDP' --source-addresses '*' --destination-addresses '*' --destination-ports 53 --action allow --priority 200
# Add Application FW Rules
az network firewall application-rule create -g $RG -f $FWNAME --collection-name 'aksfwar' -n 'AKS' --source-addresses '*' --protocols 'http=80' 'https=443' --target-fqdns '*.hcp.eastus.azmk8s.io' 'aksrepos.azurecr.io' '*blob.core.windows.net' 'mcr.microsoft.com' '*cdn.mscr.io' 'management.azure.com' 'login.microsoftonline.com' 'api.snapcraft.io' '*auth.docker.io' '*cloudflare.docker.io' '*cloudflare.docker.com' '*registry-1.docker.io' '*.ubuntu.com' 'packages.microsoft.com' 'dc.services.visualstudio.com' '*.opinsights.azure.com' '*.monitoring.azure.com' 'apt.dockerproject.org' 'nvidia.github.io' '*.azurecr.io' --action allow --priority 100
# Associate AKS Subnet to FW
@ -145,6 +149,8 @@ PASSWORD="<SERVICEPRINCIPAL_PASSWORD_GOES_HERE>"
VNETID=$(az network vnet show -g $RG --name $VNET_NAME --query id -o tsv)
# Assign SP Permission to VNET
az role assignment create --assignee $APPID --scope $VNETID --role Contributor
# View Role Assignment
az role assignment list --assignee $APPID --all -o table
```
## Next Steps

Просмотреть файл

@ -38,8 +38,6 @@ One of the key benefits of putting an Enterprise Control Plane framework in plac
![Enterprise Control Plane Governance?](/governance-security/img/EnterpriseControlPlaneGovernance.png)
![Enterprise Control Plane Architecture?](/governance-security/img/EnterpriseControlPlaneArchitecture.png)
## Next Steps
[Cluster Pre-Provisioning](/cluster-pre-provisioning/README.md)

Просмотреть файл

@ -53,6 +53,10 @@ ContosoFinancial is a mature Azure customer with the majority of their existing
* Implement & Deploy Image Processing Application
* Easily rollout new versions of Application
## Next Steps
[Return to Governance and Security Setup](governance-security/README.md)
## Key Links
* ???