Skip to content

Commit fea5196

Browse files
committed
update
1 parent 23aba95 commit fea5196

File tree

6 files changed

+20
-20
lines changed

6 files changed

+20
-20
lines changed

content/modules/ROOT/nav.adoc

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
99
* xref:05-code-change.adoc[5. Code Change]
1010
11-
* xref:06-pipeline-exploration.adoc[6. Pipeline Exploration]
11+
* xref:06-tekton-pipeline-exploration.adoc[6. Tekton Pipeline Exploration]
1212
1313
* xref:07-release-promotion.adoc[7. Release & Promotion]
1414
@@ -18,15 +18,15 @@
1818
1919
* xref:10-signed-commits.adoc[10. Sign Commits via git-sign]
2020
21-
* xref:11-AI-demo-setup.adoc[11. AI with LLMs Demo Setup]
21+
* xref:11-jenkins-pipeline-exploration.adoc[11. Jenkins Pipeline Exploration]
2222
23-
* xref:12-AI-chatbot-flow.adoc[12. AI with LLMs Chatbot Flow]
23+
* xref:12-AI-demo-setup.adoc[12. AI with LLMs Demo Setup]
2424
25-
* xref:13-AI-model-exploration.adoc[13. AI Model Exploration]
25+
* xref:13-AI-chatbot-flow.adoc[13. AI with LLMs Chatbot Flow]
2626
27-
* xref:14-AI-bring-your-own-model.adoc[14. Bring your own model]
27+
* xref:14-AI-model-exploration.adoc[14. AI Model Exploration]
2828
29-
* xref:15-jenkins-ci.adoc[15. Jenkins CI]
29+
* xref:15-AI-bring-your-own-model.adoc[15. Bring your own model]
3030
3131
* xref:16-troubleshooting.adoc[16. Troubleshooting]
3232

content/modules/ROOT/pages/06-pipeline-exploration.adoc renamed to content/modules/ROOT/pages/06-tekton-pipeline-exploration.adoc

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
== Pipeline Exploration
1+
== Tekton Pipeline Exploration
22

33
As a developer, I can see all the steps involved with the corporate standard pipeline and *GREEN is good*. As a developer, that makes me happy, I do not have worry about all the details.
44

@@ -8,21 +8,21 @@ Narrator: Now, for our architects and platform engineers in the room, you want t
88

99
Developer Hub pre-integrates several curated plug-ins that are great for overall developer experience. A lot has happened with the execution of this pipeline.
1010

11-
The first step in the pipeline is a simple `git clone`. The next step is basically a `mvn package` and then running of Sonarqube `scan-source` for static analysis. All pretty standard for CI pipelines. Get the code, compile/build the code, run some scans.
11+
The first step in the pipeline is a simple `git clone`. The next step is basically a `mvn package` and then running of Sonarqube `scan-source` for static analysis. All pretty standard for CI pipelines. Get the code, compile/build the code, run some scans.
1212

1313
=== Build Sign Image
1414

15-
It is the `build-sign-image` where things get super interesting.
15+
It is the `build-sign-image` where things get super interesting.
1616

1717
image::pipeline-exploration-2.png[]
1818

19-
The template is leveraging Tekton Chains, a Kubernetes Custom Resource Definition (CRD) controller, that nicely augments the supply chain security within OpenShift Pipelines. This tool's capacity to automatically sign task runs, and its adoption of advanced attestation formats like in-toto and SLA provenance, bring a higher degree of trust and verification to our processes. Tekton Chains works like an independent observer within the cluster, it signs, attests and stores additional artifacts as OCI images alongside with your container image.
19+
The template is leveraging Tekton Chains, a Kubernetes Custom Resource Definition (CRD) controller, that nicely augments the supply chain security within OpenShift Pipelines. This tool's capacity to automatically sign task runs, and its adoption of advanced attestation formats like in-toto and SLA provenance, bring a higher degree of trust and verification to our processes. Tekton Chains works like an independent observer within the cluster, it signs, attests and stores additional artifacts as OCI images alongside with your container image.
2020

2121
If you look on the *Image Registry* tab you will see there is are *.att*, *.sig* and *.sbom* sitting side-by-side with the resulting container image produced by the pipeline.
2222

2323
image::pipeline-exploration-3.png[]
2424

25-
This plug-in using Quay, you might remember we selected Quay in the template wizard. Quay offers yet another aspect of supply chain security, it is constantly scanning your container images at rest. Your developers might not be actively coding and if nobody has pushed a change recently then the pipeline might not have run in a while.
25+
This plug-in using Quay, you might remember we selected Quay in the template wizard. Quay offers yet another aspect of supply chain security, it is constantly scanning your container images at rest. Your developers might not be actively coding and if nobody has pushed a change recently then the pipeline might not have run in a while.
2626

2727
=== roxctl (ACS)
2828

@@ -31,11 +31,11 @@ Back to the pipeline itself and let's look at the 3 Advanced Cluster Security ta
3131
image::pipeline-exploration-4.png[]
3232

3333

34-
The bottom-most task is performing CVE scanning via `roxctl image scan`.
34+
The bottom-most task is performing CVE scanning via `roxctl image scan`.
3535

36-
The middle task is performing a policy check via `roxctl image check`. These policies might be things like 'No log4j allowed' or perhaps no curl, wget nor a package manager in a production image.
36+
The middle task is performing a policy check via `roxctl image check`. These policies might be things like 'No log4j allowed' or perhaps no curl, wget nor a package manager in a production image.
3737

38-
The top-most task is perform yaml scanning via `roxctl deployment check` and it might identify that your Deployment.yaml has not properly configured its resource request and limit.
38+
The top-most task is perform yaml scanning via `roxctl deployment check` and it might identify that your Deployment.yaml has not properly configured its resource request and limit.
3939

4040
A series of dashboards visualize the reporting from these 3 *roxctl* tasks, click on the *View Output* icon under *ACTIONS*
4141

@@ -45,11 +45,11 @@ image::pipeline-exploration-4-2.png[]
4545

4646
image::pipeline-exploration-4-3.png[]
4747

48-
These ACS polices can be seen on the following screen, just look for *Build* policies under lifecycle.
48+
These ACS polices can be seen on the following screen, just look for *Build* policies under lifecycle.
4949

5050
image::pipeline-exploration-5.png[]
5151

52-
These 3 aspects of *roxctl* are a great example of the "shift-left" idea by bringing these critical checks into the pipeline itself to be executed on each `git push`.
52+
These 3 aspects of *roxctl* are a great example of the "shift-left" idea by bringing these critical checks into the pipeline itself to be executed on each `git push`.
5353

5454
=== scan-export-sbom
5555

@@ -59,13 +59,13 @@ Pushes the SBOM to a CycloneDX repository. Currently, the SBOM is stored in Qua
5959

6060
image::pipeline-exploration-12.png[]
6161

62-
The SBOM is an artifact that deserves special mention. Think of the Software Bill of Materials as the ingredient list. I am sure you have gone to the grocery store and picked up an item and reviewed its packaging. On the back of the product there will be a list of ingredients. You can find out that something you might wish to eat includes gluten, perhaps too much sugar, or shellfish (my sister is allergic to shellfish) or perhaps nuts. Well, if you are allergic to nuts you might also be allergic to struts :-) You might remember that infamous Struts 2 vulnerability that allowed 143 million American's private data to end up on the dark web https://www.securityweek.com/apache-struts-flaw-reportedly-exploited-equifax-hack[Struts 2 hack].
62+
The SBOM is an artifact that deserves special mention. Think of the Software Bill of Materials as the ingredient list. I am sure you have gone to the grocery store and picked up an item and reviewed its packaging. On the back of the product there will be a list of ingredients. You can find out that something you might wish to eat includes gluten, perhaps too much sugar, or shellfish (my sister is allergic to shellfish) or perhaps nuts. Well, if you are allergic to nuts you might also be allergic to struts :-) You might remember that infamous Struts 2 vulnerability that allowed 143 million American's private data to end up on the dark web https://www.securityweek.com/apache-struts-flaw-reportedly-exploited-equifax-hack[Struts 2 hack].
6363

64-
The SBOM is either a JSON or XML file and is stored in the container registry as the ingredient list associated with the container image.
64+
The SBOM is either a JSON or XML file and is stored in the container registry as the ingredient list associated with the container image.
6565

6666
=== Dev Deployment
6767

68-
Click on *Topology*
68+
Click on *Topology*
6969

7070
As a developer, I want to see my handy work, did my applicatio really deploy to the dev environment?
7171

content/modules/ROOT/pages/15-jenkins-ci.adoc renamed to content/modules/ROOT/pages/11-jenkins-pipeline-exploration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
== Jenkins CI
1+
== Jenkins Pipeline Exploration
22

33
Jenkins is used to build and test your product continuously, so developers can continuously integrate changes into the build. Jenkins is the most popular open source CI/CD tool on the market today and is used in support of DevOps, alongside other cloud native tools.
44

File renamed without changes.
File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)