Kiali Development Maintenance Guide📜
Code Changes for Updates/Renovates📜
NOTE: Updated kiali-operator images can be requested by creating an issue in the Iron Bank kiali-operator project
Kiali
is a passthrough chart. That means it does not fork an upstream chart but instead embeds one as a dependency. Because of this, the upgrade
process is incredibly simple.
- Checkout the
renovate/ironbank
branch. You can either work off of this branch or branch off of it. - Check the upstream repo for chart updates.
-
Update dependencies to latest versions.
1. Update version references for the chart inhelm dependency update ./chart
Chart.yaml
.version
should be<version>-bb.0
(ex:1.25.1-bb.0
) andappVersion
should be<version>
(ex:1.25.1
). Also validate that the Big Bangbigbang.dev/applicationVersions
andhelm.sh/images
annotations are update to reflect the chart’s new application and image versions. 1. Update CHANGELOG.md adding an entry for the new version and noting all changes (at minimum this should include the lineUpdated Kiali to x.x.x
). 1. Generate the README.md using the gluon library script guidelines noting any additional chart changes you make during development testing. 1. Push your changes, validate that the CI pipeline passes. If there are any failures follow the information in the pipeline to make the necessary updates and reach out to the team if needed. 1. Deploy and test Kiali with the testing steps below. The CI pipeline provides a good set of basic smoke tests but it is beneficial to run some additional checks.
Testing kiali updates📜
You should perform these steps on both a clean install and an upgrade from BB master.
Branch/Tag Config📜
If you’d like to install from a specific branch or tag, then the code block under kiali needs to be uncommented and used to target your changes.
For example, this would target the renovate/ironbank
branch.
kiali:
<other config/labels>
...
...
# Add git branch or tag information to test against a specific branch or tag instead of using `main`
# Must set the unused label to null
git:
tag: null
branch: "renovate/ironbank"
Cluster setup📜
⚠️ Always make sure your local bigbang repo is current before deploying.
- Export your Ironbank/Harbor credentials (this can be done in your
~/.bashrc
or~/.zshrc
file if desired). These specific variables are expected by thek3d-dev.sh
script when deploying metallb, and are referenced in other commands for consistency:
export REGISTRY_USERNAME='<your_username>'
export REGISTRY_PASSWORD='<your_password>'
- Export the path to your local bigbang repo (without a trailing
/
):
⚠️ Note that wrapping your file path in quotes when exporting will break expansion of ~
.
export BIGBANG_REPO_DIR=<absolute_path_to_local_bigbang_repo>
e.g.
export BIGBANG_REPO_DIR=~/repos/bigbang
-
Run the k3d_dev.sh script to deploy a dev cluster:
For
login.dso.mil
Keycloak:"${BIGBANG_REPO_DIR}"/docs/assets/scripts/developer/k3d-dev.sh
For local
keycloak.dev.bigbang.mil
Keycloak:"${BIGBANG_REPO_DIR}"/docs/assets/scripts/developer/k3d-dev.sh
-
Export your kubeconfig:
export KUBECONFIG=~/.kube/<your_kubeconfig_file>
e.g.
export KUBECONFIG=~/.kube/Christopher.Galloway-dev-config
"${BIGBANG_REPO_DIR}"/scripts/install_flux.sh -u "${REGISTRY_USERNAME}" -p "${REGISTRY_PASSWORD}"
Deploy Bigbang📜
From the root of this repo, run one of the following deploy commands depending on which Keycloak you wish to reference:
For login.dso.mil
Keycloak:
helm upgrade -i bigbang ${BIGBANG_REPO_DIR}/chart/ -n bigbang --create-namespace \
--set registryCredentials.username=${REGISTRY_USERNAME} --set registryCredentials.password=${REGISTRY_PASSWORD} \
-f https://repo1.dso.mil/big-bang/bigbang/-/raw/master/tests/test-values.yaml \
-f https://repo1.dso.mil/big-bang/bigbang/-/raw/master/chart/ingress-certs.yaml \
-f https://repo1.dso.mil/big-bang/bigbang/-/raw/master/docs/assets/configs/example/dev-sso-values.yaml \
-f docs/dev-overrides/minimal.yaml \
-f docs/dev-overrides/kiali-testing.yaml
For local keycloak.dev.bigbang.mil
Keycloak:
helm upgrade -i bigbang ${BIGBANG_REPO_DIR}/chart/ -n bigbang --create-namespace \
--set registryCredentials.username=${REGISTRY_USERNAME} --set registryCredentials.password=${REGISTRY_PASSWORD} \
-f https://repo1.dso.mil/big-bang/bigbang/-/raw/master/tests/test-values.yaml \
-f https://repo1.dso.mil/big-bang/bigbang/-/raw/master/chart/ingress-certs.yaml \
-f docs/dev-overrides/minimal.yaml \
-f docs/dev-overrides/kiali-testing-local-keycloak.yaml
This will deploy the following apps for testing:
- Istio, Istio operator and Authservice
- Kiali and Monitoring (including Grafana), all with SSO enabled
- Optionally Keycloak
Validation/Testing Steps📜
⚠️ For testing with a local Keycloak instance, you will need to manually register or create an account as an admin before proceeding with the below tests. For more info please reference the Keycloak DEVELOPMENT_MAINTENANCE.md.
⚠️ In the Kiali web interface, the notification bell on the upper right will sometimes be red and you will see error pop-ups near it as you move between screens if there are errors. Errors on individual application listings for labels, annotations, etc are expected and OK.
- Navigate to Kiali and validate you are prompted to login with SSO and that the login is successful.
- On the main menu, choose
Overview
and verify that the panels that appear populate and that there are no errors. - Still on the main menu, choose
Workloads
, thenKiali
(if you see “no namespace is selected” here you may need to select the Kiali namespace in theSelect Namespaces
drop-down menu).- Check both
Inbound Metrics
andOutbound Metrics
. Verify that graphs populate for at least some of the items in each. Note: Sometimes it takes a while for the graphs to populate on the Inbound Metrics tab. Logging on to grafana.bigbang.dev and clicking around for a while tends to speed this up.
- Check both
- Click on
Traces
and verify that at least some traces appear on the graph. - Once you’ve confirmed that the package tests above pass, also test your branch against Big Bang per the steps in this document.
Files That Require Integration Testing📜
- ./chart/templates/bigbang/grafanaServiceEntry.yaml
- ./chart/templates/bigbang/istio/authorizationPolicies/allow-intra-namespace-policy.yaml
- ./chart/templates/bigbang/istio/authorizationPolicies/ingressgateway-authz-policy.yaml
- ./chart/templates/bigbang/istio/authorizationPolicies/template.yaml
- ./chart/templates/bigbang/kiali-clusterrolebinding-openshift-scc.yaml
- ./chart/templates/bigbang/network-attachment-definition.yaml
- ./chart/templates/bigbang/networkpolicies/additional-networkpolicies.yaml
- ./chart/templates/bigbang/networkpolicies/egress-kube-dns.yaml
- ./chart/templates/bigbang/networkpolicies/helm-test-egress.yaml
- ./chart/templates/bigbang/oidc-ca-cm.yaml
- ./chart/templates/bigbang/peerAuthentication.yaml
- ./chart/templates/bigbang/serviceEntry.yaml
- ./chart/templates/bigbang/sidecar.yaml
- ./chart/templates/bigbang/ssoServiceEntry.yaml
- ./chart/templates/bigbang/svc-patch-job.yaml
- ./chart/templates/bigbang/tracingServiceEntry.yaml
- ./chart/templates/bigbang/virtualservice.yaml
Instructions for Integration Testing📜
See the Big Bang Doc
automountServiceAccountToken📜
The mutating Kyverno policy named update-automountserviceaccounttokens
is leveraged to harden all ServiceAccounts in this package with automountServiceAccountToken: false
. This policy is configured by namespace in the Big Bang umbrella chart repository at chart/templates/kyverno-policies/values.yaml.
This policy revokes access to the K8s API for Pods utilizing said ServiceAccounts. If a Pod truly requires access to the K8s API (for app functionality), the Pod is added to the pods:
array of the same mutating policy. This grants the Pod access to the API, and creates a Kyverno PolicyException to prevent an alert.
Modifications made to the upstream chart📜
chart/values.yaml📜
-
Ensure renovate does not remove
oidcCaCert
key and associated comment. This corresponds tochart/templates/bigbang/oidc-ca-cm.yaml
added in #52 -
Add
sso
key that defaults to false. Needed for downstream changes that rely on this inchart/templates/bigbang/ssoServiceEntry.yaml
andchart/templates/bigbang/networkpolicies/egress-sso.yml
.