To use Airlock Microgateway in your OpenShift cluster, follow this guide to deploy the Airlock Microgateway Operator and its resources.
Prerequisites
- Choose the required installation mode according to the article Sidecar-based installation mode types.
- To use Airlock Microgateway, a valid license is required. Airlock Microgateway is available in a Premium and a free Community edition. To request and configure/change a license, see the article Configuration and monitoring of licenses.
- Install a
cert-manager
in your Kubernetes cluster. - All pods that Airlock Microgateway should protect must explicitly reference the Airlock Microgateway CNI
NetworkAttachmentDefinition
via the annotationk8s.v1.cni.cncf.io/networks
. - Airlock Microgateway CNI Helm charts are available here:
- Helm value files for Airlock Microgateway CNI installations on GKE and OpenShift are available as separate
values.yaml
files:
Install a cert-manager
You can install the cert-manager with the commands below in the 'VERSION'
that you wish to install. You may use the latest cert-manager version (see cert-manager Helm installation instructions), which should work fine in most cases, or install the version we use for internal testing (see tested version of cert-manager for Microgateway 4.3).
Microgateway CNI installation
Install the CNI DaemonSet and required RBAC (Role Based Access Control) manifests using our Helm charts.
We recommend installing the CNI plugin into the namespace openshift-operators
instead of kube-system
.
The default values have been tested in our installation environments. However, some values may need to be adapted to meet the requirements of your setup environment. Path information for the CNI config files and binaries can either be found in the documentation of your Kubernetes distribution or CNI provider or queried with the following commands.
The cniNetDir
, the directory of the CNI config files on the host, can be queried with:
The cniBinDir
, the directory of the CNI plugin binaries on the host, can be queried with:
Privileged access is required to install the CNI plugin on the node. In OpenShift, this may lead to a warning if the label pod-security.kubernetes.io/warn: privileged
is not set for the OpenShift operator namespace during the CNI helm install process. For the related OpenShift documentation, see Managing pod security admission in OpenShift.
- Helm-based installation procedure:
- Adapt and run the following command with the current CNI helm chart version from GitHub or a local version of the
openshift-values.yaml
file. - Wait for the Airlock Microgateway Operator to be up and running.
- Verify the correctness of the installation with
helm test
. - Check the log messages.
- On successful installation, the logs should show the message
Success
. - Disable the
helm test
deployment afterward.
Install the Airlock Microgateway Operator
In order to complete the Airlock Microgateway Operator installation and to run the below helm test
successfully, you need to deploy a valid license. See article Configuration and monitoring of licenses for more information.
- Create the
airlock-microgateway-system
namespace - Store the license in the Microgateway Operator namespace, in a Kubernetes secret with the name
airlock-microgateway-license
and the keymicrogateway-license.txt
. Use the following command: - Adapt and run the following command with the current Airlock Microgateway Operator Helm chart version. This will install
airlock-microgateway
in theairlock-microgateway-system
namespace. - Verify that the Airlock Microgateway Operator started successfully:
- Verify the correctness of the installation with
helm test
. - Check the log messages.
- On successful installation, the logs should show the following message:
### Installation of 'airlock-microgateway' succeeded
- Disable the
helm test
deployment afterward.
During installation, the installation status is echoed – i.e., the preliminary cleanup task and scaling the test installation to only 1 replica (to ensure no pods from previous runs are present).
Security Context Constraint (SCC)
The default SCC privileged
provides sufficient rights and could be used for the serviceAccount
. For further information consult the OpenShift website (Default security context constraints).
What's next
- After deploying the Airlock Microgateway Operator in your Cluster, the following steps are required:
- Configure/change the Airlock Microgateway license. See article Configuration and monitoring of licenses.
- Annotate the web application Pods to protect as explained in Labels and annotations for Airlock Microgateway.
- Create the
CustomResources
to configure the Airlock Microgateway as outlined in Configuration. - Append
default/airlock-microgateway-cni
in the annotationk8s.v1.cni.cncf.io/networks
of the web application Pod to allow the Microgateway CNI plugin work together with OpenShift Multus. For example:k8s.v1.cni.cncf.io/networks: [<network>,...],default/airlock-microgateway-cni
. For further information consider Adding a pod to an additional network in OpenShift.