Skip to main content

Automated authorization pull requests

Otterize integrates with GitHub repositories to automatically generate pull requests as application access requirements change in the cluster. This enables platform administrators to continuously align security requirements with code updates.

In this tutorial, you will:

  • Deploy a sample application.
  • Create a Git repository to store ClientIntents manifests.
  • Integrate a new Git repository into Otterize Cloud and install Otterize’s GitHub app.
  • Modify application communication patterns, thereby triggering Otterize to create a pull request with the updated ClientIntents.

Prerequisites

CLI tools

You will need the following CLI tools to set up the repository and export ClientIntents:

  1. Otterize CLI
  2. GitHub CLI

After installation, log in with gh auth login and select your preferred method for authentication. Ensure your account has the necessary permissions to create new repositories.

Deploy Otterize

With a Kubernetes cluster ready, head over to Otterize Cloud and navigate to the integrations page to deploy Otterize. Follow the provided instructions to integrate your cluster.

Tutorial

Deploy the application

Use the following command to set up the tutorial namespace and deploy a sample application simulating a fantasy tabletop game. The application comprises several services responsible for different aspects of the game.

kubectl apply -n otterize-tutorial-github -f https://docs.otterize.com/code-examples/github/all.yaml
View Deployment
apiVersion: v1
kind: Namespace
metadata:
name: otterize-tutorial-github
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: adventure
spec:
replicas: 1
selector:
matchLabels:
app: adventure
template:
metadata:
labels:
app: adventure
spec:
containers:
- name: github-tutorial
image: otterize/github-tutorial:latest
args: ["./adventure"]
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: character-generator
spec:
selector:
matchLabels:
app: character-generator
template:
metadata:
labels:
app: character-generator
spec:
containers:
- name: github-tutorial
image: otterize/github-tutorial:latest
args: ["./character-generator"]
ports:
- containerPort: 8080
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: quest-generator
spec:
selector:
matchLabels:
app: quest-generator
template:
metadata:
labels:
app: quest-generator
spec:
containers:
- name: github-tutorial
image: otterize/github-tutorial:latest
args: ["./quest-generator"]
ports:
- containerPort: 8080
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: monster-generator
spec:
selector:
matchLabels:
app: monster-generator
template:
metadata:
labels:
app: monster-generator
spec:
containers:
- name: github-tutorial
image: otterize/github-tutorial:latest
args: ["./monster-generator"]
ports:
- containerPort: 8080

---
apiVersion: apps/v1
kind: Deployment
metadata:
name: treasure-generator
spec:
selector:
matchLabels:
app: treasure-generator
template:
metadata:
labels:
app: treasure-generator
spec:
containers:
- name: github-tutorial
image: otterize/github-tutorial:latest
args: ["./treasure-generator"]
ports:
- containerPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: treasure-generator
spec:
type: ClusterIP
selector:
app: treasure-generator
ports:
- name: http
port: 8080
targetPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: character-generator
spec:
type: ClusterIP
selector:
app: character-generator
ports:
- name: http
port: 8080
targetPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: monster-generator
spec:
type: ClusterIP
selector:
app: monster-generator
ports:
- name: http
port: 8080
targetPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: quest-generator
spec:
type: ClusterIP
selector:
app: quest-generator
ports:
- name: http
port: 8080
targetPort: 8080
---

Once the deployment is complete , you can view the application's network map on Otterize Cloud. Turn on Assume default deny under network policies, as shown in the picture below.

visual graph of default deny network policy

The connections will turn red.

visual graph of cluster deployment

Export and apply ClientIntents

Otterize can automatically generate application access rules based on the actual network traffic detected by the network-mapper.

Use the Otterize CLI tool to export the recommended intent definitions. You can also access these definitions directly from the Access Graph on Otterize Cloud.

mkdir otterize-tutorial-github
cd otterize-tutorial-github
mkdir intents
otterize network-mapper export -n otterize-tutorial-github > ./intents/intents.yaml
View intents.yaml
apiVersion: k8s.otterize.com/v1alpha3
kind: ClientIntents
metadata:
name: adventure
namespace: otterize-tutorial-github
spec:
service:
name: adventure
calls:
- name: character-generator
- name: monster-generator
- name: quest-generator
- name: treasure-generator

Next, secure the application's pods by applying these intents to the cluster.

kubectl apply -n otterize-tutorial-github -f ./intents/intents.yaml

In the Access Graph, the adventure client is now allowed to access the protected services.

visual graph of cluster deployment with protected edges

Create the repository

To ensure versioned records, create a Git repository, stage and commit the applied intents. Then push the changes to the main branch.

Make sure you are in the otterize-tutorial-github directory before executing the following commands.

export GH_USER=$(gh api user | jq -r '.login')
gh repo create otterize-tutorial-github --private
git init
git add .
git commit -m "Initial Intents"
git branch -M main
git remote add origin https://github.com/$GH_USER/otterize-tutorial-github.git
git push -u origin main

The repository can now be integrated to Otterize cloud to detect drifts in case of changes in traffic patterns.

Add the GitHub repository to Otterize Cloud

tip

In this section, you will use the main branch to track ClientIntents changes.For production environments, we recommend monitoring traffic changes in other long-held branches, such as development, test, or staging. You can then deploy the new compiled ClientIntents in production with your preferred tool.

To add the repository to Otterize Cloud, navigate to the Integrations page.

  1. Click Add Integration.
  2. Select integration type: GitHub.
  3. Provide the name otterize-tutorial-github as the integration.
  4. In the On Trigger section, select your Kubernetes cluster, and leave the other options set to the predefined defaults.
  5. In the Open PR on section, select the Repository field, and provide the owner and organization names in the form: <github user name>/otterize-tutorial-github.
  6. Select the Base Branch field, and enter main.
  7. Select the ClientIntents path field, and enter intents. It represents the relative path hosting the ClientIntents manifests.
  8. Next, click the Add button. This will redirect you to GitHub. If needed, select your GitHub account that owns the tutorial repository and click continue. Then, select the desired organization and the tutorial repository (otterize-tutorial-github), as depicted in the picture below. Finally, click on Install.
GitHub App Install Example

The Otterize GitHub app is now installed in your repository. Otterize will continuously monitor for differences between the ClientIntents definitions in your repository and the actual usage detected in your cluster. If drifts are detected, pull requests will be automatically opened to update the intent definitions and reflect the new usage behaviors.

You can learn more about GitHub configuration and how to use the Triggers on the Reference page

Update the application

In the original deployment, the game simulation's adventure pod utilized the monster-generator pod to fetch a random monster. An improved version, monster-generator-v2, has just been released and is ready for deployment.

kubectl apply -n otterize-tutorial-github -f https://docs.otterize.com/code-examples/github/all-v2.yaml

Once the pod is deployed, check the logs of the adventure pod using the command below. It should reflect the new application version.

kubectl logs -f -n otterize-tutorial-github deploy/adventure

Here is an example of the expected output.

****************************************************
Let another great adventure begin!
****************************************************
Using MonsterV2 generated monster
Welcome to your adventure, Elf Wizard!
Your quest: Escort the Caravan
Beware, a wild Elephant appears!
The Elephant has 90 hit points, Our Elf has 244 points.
---------------------------------------------
Elf lands a 19 point strike against the smelly Beast!
Elephant hits our strong Elf doing 20 point of damage.
The Elephant has 71 hit points, Our Elf has 224 points.

monster-generator-v2 is now displayed in Otterize Cloud Access Graph.

visual graph of cluster deployment

Check for a new pull request

Following the introduction of a new application component, the network-mapper has detected a new connection and updated Otterize cloud. This update has triggered the GitHub integration, resulting in the submission of a new pull request.

visual graph of cluster deployment

Finally, merge the pull request and deploy the updated ClientIntents manifest.

gh pr merge 1 -m
kubectl apply -n otterize-tutorial-github -f ./intents/intents.yaml

Teardown

Delete the application.

kubectl delete namespace otterize-tutorial-github

Delete the Git repository with the following command, replacing the GitHub user name with yours.

gh repo delete $GH_USER/otterize-tutorial-github
note

If your API doesn't grant delete privileges, navigate to the repository's Settings section to delete it manually.

Finally, you can delete your local copy of the repository.

cd ..
rm -rf otterize-tutorial-github