Skip to content

Commit 10a66d1

Browse files
committed
Add info about devops and rhacs
1 parent baa2261 commit 10a66d1

File tree

3 files changed

+34
-4
lines changed

3 files changed

+34
-4
lines changed

_topic_maps/_topic_map.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ Distros: openshift-acs
298298
Topics:
299299
- Name: Integrating with image registries
300300
File: integrate-with-image-registries
301-
- Name: Integrating with CI systems
301+
- Name: Integrating RHACS into your DevOps system
302302
File: integrate-with-ci-systems
303303
- Name: Integrating with PagerDuty
304304
File: integrate-with-pagerduty

integration/integrate-with-ci-systems.adoc

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,30 @@
11
:_mod-docs-content-type: ASSEMBLY
22
[id="integrate-with-ci-systems"]
3-
= Integrating with CI systems
3+
= Integrating {product-title-short} into your DevOps system
44
include::modules/common-attributes.adoc[]
55
:context: integrate-with-ci-systems
66

77
toc::[]
88

99
[role="_abstract"]
10+
You can integrate {product-title} ({product-title-short}) into your DevOps system by using DevOps tools to configure specific {product-title-short} parameters and to create and manage custom security policies. You can also configure {product-title-short} to work with the continuous integration (CI) tools in your system to apply security policies to your images before or during deployment.
11+
12+
include::modules/configuration-using-devops.adoc[leveloffset=+1]
13+
14+
[role="_additional-resources"]
15+
.Additional resources
16+
17+
* xref:../configuration/declarative-configuration-using.adoc#declarative-configuration-using[Using declarative configuration]
18+
19+
* xref:../operating/manage_security_policies/custom-security-policies.adoc#policy-as-code-about_custom-security-policies[Managing policies as code]
20+
21+
22+
[id="integrate-ci-systems"]
23+
== Integrating with CI systems
24+
1025
{product-title} ({product-title-short}) integrates with a variety of continuous integration (CI) products. Before you deploy images, you can use {product-title-short} to apply build-time and deploy-time security rules to your images.
1126

12-
After images are built and pushed to a registry, {product-title-short} integrates into CI pipelines.
13-
Pushing the image first allows developers to continue testing their artifacts while dealing with any policy violations alongside any other CI test failures, linter violations, or other problems.
27+
After images are built and pushed to a registry, {product-title-short} integrates into CI pipelines. Pushing the image first allows developers to continue testing their artifacts while dealing with any policy violations alongside any other CI test failures, linter violations, or other problems.
1428

1529
If possible, configure the version control system to block pull or merge requests from being merged if the build stage, which includes {product-title-short} checks, fails.
1630

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * integration/integrate-with-ci-systems.adoc
4+
:_mod-docs-content-type: CONCEPT
5+
[id="configuration-using-devops_{context}"]
6+
= Configuration using DevOps
7+
8+
You can use {product-title-short} with your DevOps system to configure authentication and authorization resources, such as authentication providers, roles, permission sets, notifiers, and access scopes.
9+
10+
To use DevOps to configure these parameters, you create YAML files that contain configuration information. These files are used to create a config map that is added to {product-title-short} by using a mount point during installation of the {product-title-short} Central resource.
11+
12+
For more information, see "Using declarative configuration".
13+
14+
Additionally, you can use your DevOps system to configure and manage security policies by using the "policy as code" feature. You can author policies in YAML or JSON and save them as Kubernetes custom resources (CRs). Then, you use your DevOps system to track, manage, and apply policies to your clusters that are running {product-title-short}. A Kubernetes controller in {product-title-short} uses the API to receive information about new, updated, or deleted policies and reconciles the policy changes.
15+
16+
For more information, see "Managing policies as code".

0 commit comments

Comments
 (0)