1
0
Fork 0
mirror of https://github.com/kyverno/policy-reporter.git synced 2024-12-14 11:57:32 +00:00
policy-reporter/manifest/README.md

109 lines
3.9 KiB
Markdown
Raw Normal View History

# Installation Manifests for Policy Reporter
You can use this manifests to install Policy Reporter without additional tools like Helm or Kustomize. The manifests are structured into three installations.
The installation requires a `policy-reporter` namespace. Because the installation includes RBAC resources which requires a serviceAccountName and a namespace configuration. The default namespace is `policy-reporter`. If this namespace will be created if it does not exist.
## Policy Reporter
The `policy-reporter` folder is the basic installation for Policy Reporter without the UI. Includes a basic Configuration Secret `policy-reporter-targets`, empty by default and the `http://policy-reporter:8080/metrics` Endpoint.
### Installation
```bash
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/policy-reporter/install.yaml
```
## Default Policy Reporter UI
The `default-policy-reporter-ui` folder is the extended Policy Reporter and the default Policy Reporter UI installation.
Enables:
* Policy Reporter REST API (`http://policy-reporter:8080`)
* Policy Reporter UI Endpoint (`http://policy-reporter-ui:8080`).
Configures Policy Reporter UI as Target for Policy Reporter.
### Installation
```bash
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/default-policy-reporter-ui/namespace.yaml
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/default-policy-reporter-ui/target-secret.yaml
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/default-policy-reporter-ui/install.yaml
```
## Kyverno Policy Reporter UI
2021-05-23 07:48:37 +00:00
The `kyverno-policy-reporter-ui` folder is the extended Policy Reporter, Policy Reporter Kyverno Plugin and the extended Policy Reporter UI installation.
Enables:
* Policy Reporter REST API (`http://policy-reporter:8080`)
* Policy Reporter Metrics API (`http://policy-reporter:2112/metrics`)
* Kyverno Plugin Rest API (`http://policy-reporter-kyverno-plugin:2112/policies`)
* Kyverno Plugin Metrics API (`http://policy-reporter-kyverno-plugin:2113/metrics`)
* Policy Reporter UI Endpoint (`http://policy-reporter-ui:8080`).
Configures Policy Reporter UI as Target for Policy Reporter and enables the Kyverno Dashboard.
### Installation
```bash
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/kyverno-policy-reporter-ui/namespace.yaml
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/kyverno-policy-reporter-ui/target-secret.yaml
kubectl apply -f https://raw.githubusercontent.com/kyverno/policy-reporter/main/manifest/kyverno-policy-reporter-ui/install.yaml
```
## Target Configuration
To configure your notification targets for Policy Reporter create a secret called `policy-reporter-targets` in the `policy-reporter` namespace with an key `config.yaml` as key and the following structure as value:
```yaml
priorityMap: {}
loki:
host: ""
minimumPriority: ""
skipExistingOnStartup: true
elasticsearch:
host: ""
index: "policy-reporter"
rotation: "dayli"
minimumPriority: ""
skipExistingOnStartup: true
slack:
webhook: ""
minimumPriority: ""
skipExistingOnStartup: true
discord:
webhook: ""
minimumPriority: ""
skipExistingOnStartup: true
teams:
webhook: ""
minimumPriority: ""
skipExistingOnStartup: true
ui:
host: ""
minimumPriority: ""
skipExistingOnStartup: true
s3:
endpoint: ""
region: ""
bucket: ""
secretAccessKey: ""
accessKeyID: ""
minimumPriority: "warning"
skipExistingOnStartup: true
sources: []
```
The `kyverno-policy-reporter-ui` and `default-policy-reporter-ui` installation has an optional preconfigured `target-security.yaml` to apply. This secret configures the Policy Reporter UI as target for Policy Reporter.
2021-05-23 07:48:37 +00:00
When you change the secret while Policy Reporter is already running, you have to delete the current `policy-reporter` Pod.