examples/operator-rbac-openshift-tls/README.md
This directory contains examples and configurations for using Feast with Role-Based Access Control (RBAC) in an OpenShift environment with TLS authentication.
1-setup-operator-rbac.ipynb: Jupyter notebook for setting up RBAC with TLS in OpenShift2-client-rbac-test-pod.ipynb: Jupyter notebook demonstrating RBAC testing with TLS in OpenShift3-uninstall.ipynb: Jupyter notebook for cleaning up the RBAC setuppermissions_apply.py: Python script for applying RBAC permissions with TLS configurationclient/: Directory containing client configurations
readonly_user_deployment_tls.yaml: Deployment configuration for readonly users with TLSadmin_user_deployment_tls.yaml: Deployment configuration for admin users with TLSunauthorized_user_deployment_tls.yaml: Deployment configuration for unauthorized users with TLSfeature_repo/: Feature repository configurations
feature_store.yaml: Feature store configuration with TLS settingstest.py: Contents numerous tests for validation of permissions while accessing feast objectsSet up RBAC with TLS:
1-setup-operator-rbac.ipynb notebookpython permissions_apply.py scriptApply the appropriate deployment configurations
Test RBAC functionality with TLS authentication using 2-client-rbac-test-pod.ipynb
Clean up resources using 3-uninstall.ipynb when done
For more details, refer to the Feast documentation.