Now that Orka is Kubernetes native, resource grouping is easier than ever, and you can orchestrate your macOS VMs with Kubectl commands!
Continue reading to explore more about resource grouping in Orka 3.0.
Resource grouping has come a long way from past updates. Past grouping functionality was custom-built, which made it harder to learn and even harder for our team to maintain over time.
In addition, the provided sandboxed namespace had similar limitations. While the prior version of Orka allowed users to deploy their own Kubernetes resources inside an Orka cluster, (e.g. Users could deploy their own Jenkins controller inside the cluster.) it was not possible to isolate these Kubernetes resources from other users in that single namespace.
Orka 3.0 takes a completely different approach to grouping. Instead of having custom-built functionality, it leverages Kubernetes namespaces, which allows you to create custom isolated resource groups. The k8s namespaces can seamlessly handle grouping in a familiar way using Kubectl.
Orka 3.0 allows admin users to create namespaces with two different permissions sets:
1. Orka resource permissions – Give users within this namespace permission to manage Orka resources such as VMs, images, nodes, etc. Every Orka cluster has a default namespace with these permissions called orka-default. To create additional namespaces with this permission set, run the following command:

2. Kubernetes resource permissions – Give users within this namespace permission to manage Kubernetes resources such as deployments, pods, secrets, etc. (NOTE: As of publishing, you must have at least one Intel node in your cluster for this feature to work.) To create a namespace with this permission set, run the following command:

Orka 3.0 currently allows grouping nodes and VMs in namespaces. Initially all resources live in the orka-default namespace, which allows managing Orka resources.
The orka3 CLI targets this namespace by default. To group resources in a new namespace:
1. Create a new namespace:

2. Move a node to the newly created namespace:

3. Deploy a VM in the newly created namespace. This deploys the VM on one of the nodes in that namespace. In this case, the node is mini-1:

To manage resources in a specific namespace, use the --namespace flag in the orka3 CLI:

Orka 3.0 leverages Role-based Access Control (RBAC) to manage permissions. Admin users can use RoleBindings to grant users and service accounts permissions within a namespace or a cluster.
To grant dev access to the user test@orka.com to the orka-foo namespace, run the following command:

To grant dev access to the service account orka-sa to the orka-foo namespace, run the following command:

Admin users can also review who has access to a namespace and remove this access with the following commands:

It is important to note that:
“Good fences make good neighbors.”
Orka 3.0 brings the power and ease of Kubernetes namespaces to your Orka environment so that you can easily group and partition resources for specific uses or teams. Orchestrate your macOS VMs with Kubectl commands that your team is already familiar with to save time getting started. Just follow three simple steps:
Want to see what else is new in Orka 3.0? Check out our Orka 3.0 overview!