<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Operating on Capsule</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/</link><description>Recent content in Operating on Capsule</description><generator>Hugo -- gohugo.io</generator><language>en</language><atom:link href="https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/index.xml" rel="self" type="application/rss+xml"/><item><title>Admission Policies</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/admission-policies/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/admission-policies/</guid><description>As Capsule we try to provide a secure multi-tenant environment out of the box, there are however some additional Admission Policies you should consider to enforce best practices in your cluster. Since Capsule only covers the core multi-tenancy features, such as Namespaces, Resource Quotas, Network Policies, and Container Registries, Classes, you should consider using an additional Admission Controller to enforce best practices on workloads and other resources.
Custom Create custom Policies and reuse data provided via Tenant Status to enforce your own rules.</description></item><item><title>Architecture</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/architecture/</guid><description>Key Decisions Introducing a new separation of duties can lead to a significant paradigm shift. This has technical implications and may also impact your organizational structure. Therefore, when designing a multi-tenant platform pattern, carefully consider the following aspects. As Cluster Administrator, ask yourself:
🔑 How much ownership can be delegated to Tenant Owners (Platform Users)? The answer to this question may be influenced by the following aspects:
Are the Cluster Adminsitrators willing to grant permissions to Tenant Owners?</description></item><item><title>Authentication</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/authentication/</guid><description>Capsule does not care about the authentication strategy used in the cluster and all the Kubernetes methods of authentication are supported. The only requirement to use Capsule is to assign tenant users to the group defined by userGroups option in the CapsuleConfiguration, which defaults to projectcapsule.dev.
OIDC In the following guide, we&amp;rsquo;ll use Keycloak an Open Source Identity and Access Management server capable to authenticate users via OIDC and release JWT tokens as proof of authentication.</description></item><item><title>Monitoring</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/monitoring/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/monitoring/</guid><description>The Capsule dashboard allows you to track the health and performance of Capsule manager and tenants, with particular attention to resources saturation, server responses, and latencies. Prometheus and Grafana are requirements for monitoring Capsule.
ResourcePools Instrumentation for ResourcePools.
Dashboards Dashboards can be deployed via helm-chart, enable the following values:
monitoring: dashboards: enabled: true Capsule / ResourcePools Dashboard which grants a detailed overview over the ResourcePools
Rules Example rules to give you some idea, what&amp;rsquo;s possible.</description></item><item><title>Backup &amp; Restore</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/backup-restore/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/backup-restore/</guid><description>Velero is a backup and restore solution that performs data protection, disaster recovery and migrates Kubernetes cluster from on-premises to the Cloud or between different Clouds.
When coming to backup and restore in Kubernetes, we have two main requirements:
Configurations backup Data backup The first requirement aims to backup all the resources stored into etcd database, for example: namespaces, pods, services, deployments, etc. The second is about how to backup stateful application data as volumes.</description></item><item><title>Templating</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/templating/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/templating/</guid><description>Fast Templates For simple template cases we provide a fast templating engine. With this engine, you can use Go templates syntax to reference Tenant and Namespace fields. There are no operators or anything else supported.
Available fields are:
{{tenant.name}}: The Name of the Tenant {{namespace}}: The Name of the Tenant Sprout Templating Our template library is mainly based on the upstream implementation from Sprout. You can find the all available functions here:</description></item><item><title>Troubleshooting</title><link>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/troubleshoting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-82--docs-projectcapsule.netlify.app/docs/operating/troubleshoting/</guid><description/></item></channel></rss>