-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
event grid namespaces infrastructure and access #86
Conversation
Please rebase pull request. |
8519aac
to
a4de6d6
Compare
@microsoft-github-policy-service agree company="Red Hat" |
a4de6d6
to
0b85144
Compare
Please rebase pull request. |
4170632
to
600a7b0
Compare
96632dc
to
e19d68c
Compare
09e0f73
to
11c7d56
Compare
this PR introduces a bicep templates to create the regional cloud infrastructure required by maestro and defined in [SD-DDR-0024](https://docs.google.com/document/d/1JUbv0Zco--SPpWH7pIsuzuKTUtq2S4WovAoPuAt5PPI/edit). the general infrastructure part is managed in the `maestro-infra.bicep` module. it is included into the `svc-cluster.bicep` template as proposed in SD-DDR-0030. * create an eventgrid MQTT broker * creates a keyvault for the client certificates that are used for authentication * right now, only self-signed certificates are supported, which is fine for DEV * for int/prod OneCertV2 will be used * defines the basic authentication configuration for eventgrid (MQTT client groups, topic spaces, topic access templates) authentication and authorization for a maestro server or consumer is managed via the `maestro-eventgrid-access.bicep` module. it is responsible for: * creating a client certificate for authn in key vault * grants key vault access to the certificate to a managed identity (used for CSI secret store to access the secret from the cluster) * registers an MQTT client in the EventGrid client registry and assigns proper access the `maestro-server.bicep` module dresses up a Service Cluster for the installation of the Maestro server. it leverages `maestro-eventgrid-access.bicep` to define the broker access and places some manifests on the AKS cluster: * a `Secret` containing EventGrid details like the hostname * a CSI `SecretProviderClass` CR to access the client certificate for broker access part of https://issues.redhat.com/browse/ARO-7244 Signed-off-by: Gerd Oberlechner <[email protected]>
11c7d56
to
83eeac6
Compare
@@ -253,7 +253,7 @@ resource aksCluster 'Microsoft.ContainerService/managedClusters@2024-01-01' = { | |||
enabled: true | |||
config: { | |||
enableSecretRotation: 'true' | |||
rotationPollInterval: '24h' | |||
rotationPollInterval: '5m' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this an intentional change? The change makes sense to me, I don't know why it was 24h previously, but just want to make sure
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we can discuss around the value. i think the default is 2m
Signed-off-by: Gerd Oberlechner <[email protected]>
this PR introduces a bicep templates to create the regional cloud infrastructure required by maestro and defined in SD-DDR-0024.
the general infrastructure part is managed in the
maestro-infra.bicep
module. it is included into thesvc-cluster.bicep
template as proposed in SD-DDR-0030.authentication and authorization for a maestro server or consumer is managed via the
maestro-eventgrid-access.bicep
module. it is responsible for:the
maestro-server.bicep
module dresses up a Service Cluster for the installation of the Maestro server. it leveragesmaestro-eventgrid-access.bicep
to define the broker access and places some manifests on the AKS cluster:Secret
containing EventGrid details like the hostnameSecretProviderClass
CR to access the client certificate for broker accesspart of https://issues.redhat.com/browse/ARO-7244
What this PR does
introduce bicep config for maestro regional infrastructure.
Jira: https://issues.redhat.com/browse/ARO-7244
Special notes for your reviewer
Checklist
This checklist is not enforcing, but it's a reminder of items that could be relevant to every PR.
Approvers are expected to review this list.