Lab Exercise
Let's solve some things to better understand the Camunda 8 platform.
#1. Lets create a new JWT access token.
Can you identify the subject (sub) claim in the token?
Specifically, where is this (sub) value coming from?
export ZEEBE_SECRET=$(kubectl get secret identity-secret-for-components -n $UNAMESPACE -o jsonpath="{.data.zeebe-secret}" | base64 --decode)
curl -X POST "https://${UNAMESPACE}.makelabs.in/auth/realms/camunda-platform/protocol/openid-connect/token" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "grant_type=client_credentials" \
-d "client_id=zeebe" \
-d "client_secret=${ZEEBE_SECRET}"
View the token using jwt.io website.
Can you identify the subject (sub) claim in the token?
Specifically, where is this (sub) value coming from?
#2. In the helm install step for Camunda, the release number is sent as a parameter (12.4.0).
Hint: Use Project Lens UI app to look for the deployed helm charts.
In real-life scenario, if you are given an existing Kubernetes environment, how would you find out the Camunda release number?
Hint: Use Project Lens UI app to look for the deployed helm charts.
#3. Assume that a component (say Connectors Pod) is deleted from the runtime deployment.
How do you re-deploy the missing "Connectors" component?
#4. The elasticsearch pod running in your respective namespace, is it running on http plaintext port or tls?
Hint: Use kubectl or Project Lens UI app.