Skip to content

Commit

Permalink
docs: DOC-1588
Browse files Browse the repository at this point in the history
  • Loading branch information
karl-cardenas-coding committed Jan 11, 2025
1 parent f2272b0 commit 7e4dd9d
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 138 deletions.
128 changes: 0 additions & 128 deletions docs/docs-content/clusters/cluster-management/palette-webctl.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,131 +68,3 @@ You can now issue kubectl commands against your host cluster.
### Validate

Verify you have access to your host cluster by issuing kubectl commands against it.

<!-- # Overview
Palette leverages Kubectl through an in-built command line interface for the users to communicate with their workload clusters. This enables our users to deploy applications, inspect and manage cluster resources, and view logs using the Palette terminal without an external terminal.
# Usage Scenarios
* Cluster Access
* Cluster access with OIDC Authentication enabled
* Cluster access with Spectro Proxy
* CLI-Based Cluster Access
## Cluster Access
For general scenario, a user can connect to the cluster directly as below:
<br/>
1. Launch a cluster from the `Project Admin` Console.
2. Go the the `Cluster Details` page
3. Click the `Connect` button available at the `Kubernetes Config File.`
4. Wait for the terminal to be launched and start communicating to the cluster using the `kubectl` commands.
## Cluster Access with OIDC Authentication Enabled
Cluster access with OIDC authentication enables the clients to verify the end user's identity before establishing cluster connectivity. The user needs to establish an OIDC-based authentication to the cluster through an identity provider of their choice. To establish cluster access with OIDC authentication, follow the steps below:
<br/>
1. Connfigure the OIDC provider callback or redirect url to use the following URL: `https://console.spectrocloud.com/v1/shelly/oidc/callback`
2. Launch a cluster from the **Project** scope and enable cluster OIDC.
**Note:** To enable OIDC, the user can use the Spectro RBAC Add-on or the Kubernetes YAML file.
3. Go the the **Cluster Details** page.
4. Click the **Connect** button by the **Kubernetes Config File**
5. Wait for the terminal to be launched.
6. Once the terminal is launched, give a kubectl command to obtain the console endpoint.
7. Copy the endpoint on the terminal, open a browser window, and provide your OIDC credentials.
8. After successful login to the page, get back to the terminal and start communicating to the cluster using the `kubectl` commands.
## Cluster Access with Spectro Proxy
Palette users can attach [Spectro Proxy](/integrations/frp/) pack to the cluster profile while profile creation. This installs the FRP client to the workload clusters and configures it with an FRP server to establish external connectivity for private clusters. To establish cluster access with Spectro Proxy (Forward Reverse Proxy), follow the steps below:
<br/>
1. Launch a cluster from the ‘Project Admin’ Console.
**Note:** The cluster profile must have an attached Spectro Proxy add-on pack.
2. Go the the `Cluster Details` page.
3. Click the ‘Connect’ button at the ‘Kubernetes Config File.’
4. Wait for the terminal to be launched.
5. Once the terminal launch, give the following command:
```
kubectl config set-cluster <CLUSTER_NAME> --insecure-skip-tls-verify=true
```
6. This establishes the connectivity between the workload cluster and external API. Now the user can start communicating to the cluster using the ‘kubectl’ commands.
:::info
While creating EKS clusters with a **Private** endpoint, adding a proxy pack is mandatory for establishing Palette Web kubectl connectivity.
:::
## CLI-Based Cluster Access
The users can establish connectivity for public clusters via the public cloud CLI. To establish the CLI-based cluster access, follow the steps below:
<br />
1. Launch a cluster from the `Project Administrator` Console.
2. Go the the `Cluster Details` page.
3. Click the `Connect` button available at the `Kubernetes Config File.`
4. Wait for the terminal to be launched. Once the terminal is launched, configure the `Public Cloud CLI`.
**Example:**
For AWS clusters, the CLI can be configured using the below command and authenticate using the AWS console credentials like Access key and Secret key.
<br />
```
aws configure
```
5. Once the configuration is done, start communicating to the cluster using the ‘kubectl’ commands.
-->
Original file line number Diff line number Diff line change
Expand Up @@ -93,11 +93,10 @@ standard that Palette employs. You can only use the OIDC-based approach for Micr
9. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The
URIs in the table below are useful when you want to use AD FS for OIDC authentication into your Kubernetes clusters.

| URL | Type of Access |
| ---------------------------------------------------------- | ----------------------------------------------------------- |
| `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation |
| `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console |
| `https://<fqdn_of_k8s_dashboard>/oauth/callback` | Using OIDC authentication into Kubernetes Dashboard |
| URL | Type of Access |
| ------------------------------------------------ | ----------------------------------------------------------- |
| `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation |
| `https://<fqdn_of_k8s_dashboard>/oauth/callback` | Using OIDC authentication into Kubernetes Dashboard |

10. When you have completed entering redirect URIs, click **Next**. On the next page of the wizard, select **Generate a
shared secret** and click **Copy to clipboard** to copy the secret value and save it somewhere. You will need to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,11 +85,10 @@ The following steps will guide you on how to enable Palette SSO with
8. These two redirect URIs are required for SSO to work with Palette. You can also add additional redirect URIs. The
URIs in the table below are useful when you want to use Okta for OIDC authentication into your Kubernetes clusters.

| URL | Type of Access |
| ---------------------------------------------------------- | ------------------------------------------------------------ |
| `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. |
| `https://console.spectrocloud.com/v1/shelly/oidc/callback` | Using the web-based kubectl console. |
| `https://<fqdn_of_k8s_dashboard>/oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. |
| URL | Type of Access |
| ------------------------------------------------ | ------------------------------------------------------------ |
| `http://localhost:8000` | Using kubectl with the kube-login plugin from a workstation. |
| `https://<fqdn_of_k8s_dashboard>/oauth/callback` | Using OIDC authentication into Kubernetes Dashboard. |

9. When you have completed entering redirect URIs, scroll down to the **Assignments** section and section and select
**Allow everyone in your organization to access**. Leave the **Enable immediate access with Federation Broker Mode**
Expand Down

0 comments on commit 7e4dd9d

Please sign in to comment.