OpenShift
The OpenShift install path is experimental. It currently requires running sandbox pods under the privileged SCC and installing the gateway with TLS and the PKI init job disabled. Use only for evaluation on a private network.
OpenShift’s Security Context Constraints reject the chart’s default pod security settings. Installing on OpenShift requires precreating the namespace, granting the privileged SCC to the default service account, and overriding a few chart values so the cluster admission controller can assign UIDs and FS groups itself.
Prerequisites
- OpenShift 4.x cluster with
occonfigured - Helm 3.x
- Agent Sandbox controller and CRDs installed
Install
Create the namespace
Pre-create the namespace so the SCC binding can be applied before the chart installs:
Connect to the gateway
The gateway is now running over plaintext HTTP. Connect with oc port-forward:
Register the gateway with the CLI:
Next Steps
- For TLS-enabled deployments, refer to Managing Certificates after SCC-compatible PKI is supported.
- To expose the gateway externally, refer to Ingress.
- To configure OIDC authentication, refer to Access Control.