|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * networking/ingress-node-firewall-operator.adoc |
| 4 | + |
| 5 | +:_content-type: PROCEDURE |
| 6 | +[id="installing-infw-operator_{context}"] |
| 7 | += Installing the Ingress Node Firewall Operator |
| 8 | + |
| 9 | +As a cluster administrator, you can install the Ingress Node Firewall Operator by using the {product-title} CLI or the web console. |
| 10 | + |
| 11 | +[id="install-operator-cli_{context}"] |
| 12 | +== Installing the Ingress Node Firewall Operator using the CLI |
| 13 | + |
| 14 | +As a cluster administrator, you can install the Operator using the CLI. |
| 15 | + |
| 16 | +.Prerequisites |
| 17 | + |
| 18 | +* You have installed the OpenShift CLI (`oc`). |
| 19 | +* You have an account with administrator privileges. |
| 20 | + |
| 21 | +.Procedure |
| 22 | + |
| 23 | +. To create the `openshift-ingress-node-firewall` namespace, enter the following command: |
| 24 | ++ |
| 25 | +[source,terminal] |
| 26 | +---- |
| 27 | +$ cat << EOF| oc create -f - |
| 28 | +apiVersion: v1 |
| 29 | +kind: Namespace |
| 30 | +metadata: |
| 31 | + labels: |
| 32 | + pod-security.kubernetes.io/enforce: privileged |
| 33 | + pod-security.kubernetes.io/enforce-version: v1.24 |
| 34 | + name: openshift-ingress-node-firewall |
| 35 | +EOF |
| 36 | +---- |
| 37 | + |
| 38 | +. To create an `OperatorGroup` CR, enter the following command: |
| 39 | ++ |
| 40 | +[source,terminal] |
| 41 | +---- |
| 42 | +$ cat << EOF| oc create -f - |
| 43 | +apiVersion: operators.coreos.com/v1 |
| 44 | +kind: OperatorGroup |
| 45 | +metadata: |
| 46 | + name: ingress-node-firewall-operators |
| 47 | + namespace: openshift-ingress-node-firewall |
| 48 | +EOF |
| 49 | +---- |
| 50 | + |
| 51 | +. Subscribe to the Ingress Node Firewall Operator. |
| 52 | + |
| 53 | +.. To create a `Subscription` CR for the Ingress Node Firewall Operator, enter the following command: |
| 54 | ++ |
| 55 | +[source,terminal] |
| 56 | +---- |
| 57 | +$ cat << EOF| oc create -f - |
| 58 | +apiVersion: operators.coreos.com/v1alpha1 |
| 59 | +kind: Subscription |
| 60 | +metadata: |
| 61 | + name: ingress-node-firewall-sub |
| 62 | + namespace: openshift-ingress-node-firewall |
| 63 | +spec: |
| 64 | + name: ingress-node-firewall |
| 65 | + channel: stable |
| 66 | + source: redhat-operators |
| 67 | + sourceNamespace: openshift-marketplace |
| 68 | +EOF |
| 69 | +---- |
| 70 | + |
| 71 | +. To verify that the Operator is installed, enter the following command: |
| 72 | ++ |
| 73 | +[source,terminal] |
| 74 | +---- |
| 75 | +$ oc get ip -n openshift-ingress-node-firewall |
| 76 | +---- |
| 77 | ++ |
| 78 | +.Example output |
| 79 | +[source,terminal] |
| 80 | +---- |
| 81 | +NAME CSV APPROVAL APPROVED |
| 82 | +install-5cvnz ingress-node-firewall.4.12.0-202211122336 Automatic true |
| 83 | +---- |
| 84 | + |
| 85 | +. To verify the version of the Operator, enter the following command: |
| 86 | + |
| 87 | ++ |
| 88 | +[source,terminal] |
| 89 | +---- |
| 90 | +$ oc get csv -n openshift-ingress-node-firewall |
| 91 | +---- |
| 92 | ++ |
| 93 | +.Example output |
| 94 | +[source,terminal] |
| 95 | +---- |
| 96 | +NAME DISPLAY VERSION REPLACES PHASE |
| 97 | +ingress-node-firewall.4.12.0-202211122336 Ingress Node Firewall Operator 4.12.0-202211122336 ingress-node-firewall.4.12.0-202211102047 Succeeded |
| 98 | +---- |
| 99 | + |
| 100 | +[id="install-operator-web-console_{context}"] |
| 101 | +== Installing the Ingress Node Firewall Operator using the web console |
| 102 | + |
| 103 | +As a cluster administrator, you can install the Operator using the web console. |
| 104 | + |
| 105 | +.Prerequisites |
| 106 | + |
| 107 | +* You have installed the OpenShift CLI (`oc`). |
| 108 | +* You have an account with administrator privileges. |
| 109 | + |
| 110 | +.Procedure |
| 111 | + |
| 112 | + |
| 113 | +. Install the Ingress Node Firewall Operator: |
| 114 | + |
| 115 | +.. In the {product-title} web console, click *Operators* -> *OperatorHub*. |
| 116 | + |
| 117 | +.. Select *Ingress Node Firewall Operator* from the list of available Operators, and then click *Install*. |
| 118 | + |
| 119 | +.. On the *Install Operator* page, under *Installed Namespace*, select *Operator recommended Namespace*. |
| 120 | + |
| 121 | +.. Click *Install*. |
| 122 | + |
| 123 | +. Verify that the Ingress Node Firewall Operator is installed successfully: |
| 124 | + |
| 125 | +.. Navigate to the *Operators* -> *Installed Operators* page. |
| 126 | + |
| 127 | +.. Ensure that *Ingress Node Firewall Operator* is listed in the *openshift-ingress-node-firewall* project with a *Status* of *InstallSucceeded*. |
| 128 | ++ |
| 129 | +[NOTE] |
| 130 | +==== |
| 131 | +During installation an Operator might display a *Failed* status. |
| 132 | +If the installation later succeeds with an *InstallSucceeded* message, you can ignore the *Failed* message. |
| 133 | +==== |
| 134 | + |
| 135 | ++ |
| 136 | +If the Operator does not have a *Status* of *InstallSucceeded*, troubleshoot using the following steps: |
| 137 | + |
| 138 | ++ |
| 139 | +* Inspect the *Operator Subscriptions* and *Install Plans* tabs for any failures or errors under *Status*. |
| 140 | +* Navigate to the *Workloads* -> *Pods* page and check the logs for pods in the `openshift-ingress-node-firewall` project. |
| 141 | +* Check the namespace of the YAML file. If the annotation is missing, you can add the annotation `workload.openshift.io/allowed=management` to the Operator namespace with the following command: |
| 142 | ++ |
| 143 | +[source,terminal] |
| 144 | +---- |
| 145 | +$ oc annotate ns/openshift-ingress-node-firewall workload.openshift.io/allowed=management |
| 146 | +---- |
| 147 | ++ |
| 148 | +[NOTE] |
| 149 | +==== |
| 150 | +For {sno} clusters, the `openshift-ingress-node-firewall` namespace requires the `workload.openshift.io/allowed=management` annotation. |
| 151 | +==== |
0 commit comments