Skip to content

f5devcentral/volterra-onboarding

Repository files navigation

Volterra Onboarding

This project contains scripts to help onboard user(s) to a Volterra Tenant Console

Requirements

This script requires

Setup

To configure the script please run the following commands:

pip3 install -r requirements.txt
./cli.py config azure
./cli.py config volterra

For more information about each action use the built-in help:

./cli.py config azure --help
./cli.py config volterra --help

Usage

The script can add an individual user or all users in an AD group to the Volterra console.

Add User

The example below adds the yourusername@example.com user to the Volterra console.

./cli.py add yourusername@example.com --tenant mytenant

Add Group

The example below adds all users of the SRE group to the Volterra console.

./cli.py add SRE --tenant mytenant

Remove User

The example below removes the yourusername@example.com user to the Volterra console.

./cli.py remove yourusername@example.com --tenant mytenant

Remove Group

The example below adds all users of the SRE group to the Volterra console.

./cli.py remove SRE --tenant mytenant

For more information about each action use the built-in help:

./cli.py --help
./cli.py add --help
./cli.py remove --help
./cli.py config --help

Troubleshoot

You can increase the logging level by running the following config command:

./cli.py config loglevel

Supported log levels are:

  • CRITICAL
  • ERROR
  • WARNING
  • INFO
  • DEBUG

Additional Scripts

AD Group Compare

This script will compare the users in the Voltera Tenant Console versus an Active Directory Group. The script will display the users to are missing from the Azure AD group.

./ad_group_compare.py --help
./ad_group_compare.py --name SRE --tenant mytenant

Running as a Kubernetes Job

Create Secrets

The CLI needs the following secrets for the docker container to run correctly:

  • Azure AD Application Client ID
  • Azure AD Application Secret
  • Azure AD Tenant ID
  • Volterra VoltConsole Access Token

Run the following commands to create these secrets:

export KUBECONFIG=<your k8s config file>
export CLIENT_ID=<your azure ad app client id>
export CLIENT_SECRET=<your azure ad app secret>
export TENANT_ID=<your azure ad tenant id>
export VOLT_TOKEN=<your voltconsole access token>
kubectl create secret generic volterra-sso \
    --from-literal=aad-client-id=$CLIENT_ID \
    --from-literal=aad-client-secret=$CLIENT_SECRET \
    --from-literal=aad-tenant=$TENANT_ID \
    --from-literal=volt-token=$VOLT_TOKEN

Support

For support, please open a GitHub issue. Note, the code in this repository is community supported and is not supported by F5 Networks. For a complete list of supported projects please reference SUPPORT.md.

Community Code of Conduct

Please refer to the F5 DevCentral Community Code of Conduct.

License

Apache License 2.0

Copyright

Copyright 2014-2020 F5 Networks Inc.

F5 Networks Contributor License Agreement

Before you start contributing to any project sponsored by F5 Networks, Inc. (F5) on GitHub, you will need to sign a Contributor License Agreement (CLA).

If you are signing as an individual, we recommend that you talk to your employer (if applicable) before signing the CLA since some employment agreements may have restrictions on your contributions to other projects. Otherwise by submitting a CLA you represent that you are legally entitled to grant the licenses recited therein.

If your employer has rights to intellectual property that you create, such as your contributions, you represent that you have received permission to make contributions on behalf of that employer, that your employer has waived such rights for your contributions, or that your employer has executed a separate CLA with F5.

If you are signing on behalf of a company, you represent that you are legally entitled to grant the license recited therein. You represent further that each employee of the entity that submits contributions is authorized to submit such contributions on behalf of the entity pursuant to the CLA.