Skip to content

Add get starting guide#176

Merged
Jakob-Naucke merged 1 commit intotrusted-execution-clusters:mainfrom
alicefr:get-started
Feb 11, 2026
Merged

Add get starting guide#176
Jakob-Naucke merged 1 commit intotrusted-execution-clusters:mainfrom
alicefr:get-started

Conversation

@alicefr
Copy link
Contributor

@alicefr alicefr commented Jan 31, 2026

No description provided.

@alicefr alicefr marked this pull request as draft January 31, 2026 06:08

Example:
```console
export TRUSTEE_ADDR=kbs-service.trusted-execution-clusters.svc.cluster.local

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For external trustee users, we can't use this address directly.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I added a comment that it is only for setup up that uses the pod networking like kubevirt

@yairpod
Copy link

yairpod commented Feb 5, 2026

A few notes that can be added:

Required tools

To build the operator the following tools are needed:

  • development-tools/build-essential: for the general set of build tools, especially make
  • docker/podman - for building containers and running the tests.
  • cargo, rustfmt, additional rust tools - if they are not included in the development-tools/build-essential, used to build the operator that is written in rust.
  • golang - for the Kubernetes crds.
  • kind - for the testing environment.
  • kubectl + kubevirt - needed to run the integration tests

Setup

make sure the testing environment has the ssh-agent rumming.

@alicefr
Copy link
Contributor Author

alicefr commented Feb 6, 2026

Added the tools

Copy link
Contributor

@Jakob-Naucke Jakob-Naucke left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for writing this up and sorry for my delayed review. Mostly nits.


These ports can be used in order to access the endpoint if you are creating the VMs externally to the cluster, for example via Libvirt.

Alongside the kind cluster, a registry is running and can be accessed with tagging, pushing and pulling the images using `locahost:5000` from and to the host and the cluster as well.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Alongside the kind cluster, a registry is running and can be accessed with tagging, pushing and pulling the images using `locahost:5000` from and to the host and the cluster as well.
Kind launches a registry alongside the cluster.
The registry will serve on port 5000, so users can tag and push images to the local registry at `localhost:5000`.
Cluster workloads can then use this registry.

Clarity (what provides the registry, what do users do with registries)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To be very picky, we launch the registry with the container runtime, kind is configured to access the local registry

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah of course, I should have read create-cluster-kind.sh better.

I see you removed the section as a whole -- I thought it had some merits, but I'd also understand if you think it's out of scope.

Signed-off-by: Alice Frosi <afrosi@redhat.com>
@alicefr alicefr marked this pull request as ready for review February 10, 2026 08:12
@openshift-ci
Copy link

openshift-ci bot commented Feb 11, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: alicefr, Jakob-Naucke

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@Jakob-Naucke Jakob-Naucke merged commit e886683 into trusted-execution-clusters:main Feb 11, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants