Openshift Deploy
Learn how to deploy Akto on Openshift cluster
Openshift is RedHat's managed private cluster offering - based on Docker and orchestration by Kubernetes.
Steps to get Akto running on your Openshift cluster -
You can use same steps as Helm Deploy to deploy Akto.
Add service account to get permissions for traffic connector.
You can use eBPF on mTLS as your traffic connector.
Add the following to the Daemonset connector -
They listen to
anyinterface by default - which might NOT be allowed in some Openshift clusters. If that's the case, contact [email protected] - we can help listen traffic onbr-exinterface.
containers:
- name: mirror-api-logging
...
# add the following lines to add additional privileges
privileged: true
securityContext:
runAsUser: 0
privileged: trueService account manifest
On Openshift, for a pod to be able to listen to node traffic (eg. a daemonset pod), it needs to be assigned some special permissions.
1. Create a Service Account
Create a Security Context Constraint. Substitute <NAMESPACE> with Akto daemonset yaml namespace.
Add SCC to service account
Notes:
The SecurityContextConstraints are based on official Redhat documentation, supporting up to v4.19
Get Support for your Akto setup
There are multiple ways to request support from Akto. We are 24X7 available on the following:
In-app
intercomsupport. Message us with your query on intercom in Akto dashboard and someone will reply.Join our discord channel for community support.
Contact
[email protected]for email support.Contact us here.
Last updated
Was this helpful?