OpenShift
The OpenShift install path is experimental. It currently requires running sandbox pods under the privileged SCC and installing the gateway with TLS and the PKI init job disabled. Use only for evaluation on a private network.
OpenShift’s Security Context Constraints reject the chart’s default pod security settings. Installing on OpenShift requires precreating the namespace, granting the privileged SCC to the default service account, and overriding a few chart values so the cluster admission controller can assign UIDs and FS groups itself.
Prerequisites
- OpenShift 4.x cluster with
occonfigured - Helm 3.x
- Agent Sandbox controller and CRDs installed
Install
Create the namespace
Pre-create the namespace so the SCC binding can be applied before the chart installs:
Connect to the gateway
The gateway is now running over plaintext HTTP. Connect with oc port-forward:
Register the gateway with the CLI:
Next Steps
- For TLS-enabled deployments, see Managing Certificates once SCC-compatible PKI is supported.
- To expose the gateway externally, see Ingress.
- To configure OIDC authentication, see Access Control.