Keyboard Time: 5 mins, Automation Wait Time: 10 mins
Scenarios: Instructor-Led, Self-Paced
Until 361792 is resolved, you will need to run this command in the cluster:
kubectl create serviceaccount gitlab-agent -n gitlab-agent
Run the following command to tail the kubernetes agent log while deployments are happening:
kubectl logs -f -l=app=gitlab-agent -n gitlab-agent
Leave this view open as you will be instructed to consult it to see the deployment logging activity when the GItLab Agent pulls and processes the kubernetes manifest.
Open ‘classgroup/cluster-management’
In the left navigation, Click Repository => Files
On the upper right of the Project page, Click Web IDE
Navigate to the file .gitlab/agents/spotazuseast2-agent/config.yml
Look at the minutes past the hour of the current time.
Add 5 minutes and insert the following snippet - substitute your minutes number for ‘55’ in the below:
starboard:
cadence: '55 * * * *' #Every hour at 55 minutes past the hour
Click Create commit…
Select Commit to master branch
Under ‘Commit Message’, Type [skip ci] Adding Manfest Security Scanning
Click Commit
The time can be updated to retrigger the agent if there are problems getting it to run.
For Instructor-Led: the instructor may have this view displayed for everyone
[Automation Wait Time: ~5 mins] Wait for the cluster to receive the new directive and perform a scan.
To see scanning results, while in ‘classgroup/cluster-management’
Click Infrastructure => Kubernetes clusters => spot2az-agent1 => Security (Tab)
Under ‘Status’ Click [to expand the drop down] and then Click All statuses
These findings are also visible in the standard security dashboards.
Open ‘classgroup’
On the left navigation, Click Security & Compliance => Vulnerability Report
In the tab bar under ‘Vulnerability report’, Click Operational vulnerabilities
Under ‘Status’ Click [to expand the drop down] and then Click All statuses
Notice the list of vulnerabilities.