Using Tigera Secure EE
Tigera Secure EE is a software-defined network solution that can be used with Kubernetes. For those familiar with Calico, Tigera Secure EE is essentially Calico with enterprise features on top.
Support for Tigera Secure EE in Charmed Kubernetes is provided in the form of a
tigera-secure-ee
subordinate charm, which can be used instead of flannel
or
calico
.
Deploying Charmed Kubernetes with Tigera Secure EE
Before you start, you will need:
- Tigera Secure EE licence key
- Tigera private Docker registry credentials (provided as a Docker config.json)
Deploy the charmed-kubernetes
bundle with the tigera overlay:
Configure the tigera-secure-ee
charm with your licence key and registry
credentials:
Wait for the deployment to settle before continuing on.
Using the built-in elasticsearch-operator
For testing and quick start purposes, the tigera-secure-ee
charm deploys
elasticsearch-operator into your Kubernetes cluster by default. For it to
properly work, you will need to create a StorageClass.
The easiest way to do this is with the hostpath provisioner. Create a file named
elasticsearch-storage.yaml
containing the following:
Apply elasticsearch-storage.yaml:
Once you have a StorageClass available, delete the existing PVC and pods so Kubernetes will recreate them using the new StorageClass:
For a more robust storage solution, consider deploying Ceph with Charmed Kubernetes, as documented in the Storage section. This will create a default StorageClass that elasticsearch-operator will use automatically.
Using your own ElasticSearch
Disable the built-in elasticsearch operator:
Accessing cnx-manager
The cnx-manager service is exposed as a NodePort on port 30003. Run the following command to open port 30003 on the workers:
Then connect to https://<kubernetes-worker-ip>:30003
in your web browser. Use
the Kubernetes admin credentials to log in (you can find these in the kubeconfig
file created on kubernetes-control-plane units at /home/ubuntu/config
).
Accessing kibana
The kibana service is exposed as a NodePort on port 30601. Run the following command to open port 30601 on the workers:
Then connect to http://<kubernetes-worker-ip>:30601
in your web browser.
Using a private Docker registry
For a general introduction to using a private Docker registry with Charmed Kubernetes, please refer to the Private Docker Registry page.
In addition to the steps documented there, you will need to upload the following images to the registry:
And configure Tigera Secure EE to use the registry with this shell script:
See the guide to contributing or discuss these docs in our public Mattermost channel.