Air-Gapped Install
For environments that are connected to the Internet, one needs access to three repositories to install K10:
The Helm repository that contains the K10 chart
The container registry that contains the K10 container images
Upstream repositories to install K10 dependencies (e.g., Prometheus)
However, if an air-gapped installation is required, it is possible to
use your own private container registry to install K10. While this can
always be done manually, the k10offline
tool makes it easier to
automate the process.
Air-Gapped K10 Installation
If the K10 container images are already available in a private repository, the below instructions can be used to install in an air-gapped environment. If needed, support for uploading images to a private image registry is documented below.
Fetching the Helm Chart for Local Use
To fetch the most recent K10 Helm chart for local use, run the following
command to pull the latest K10 chart as a compressed tarball (.tgz
)
file into the working directory.
$ helm repo update && \
helm fetch kasten/k10
If you need to fetch a specific version, please run the following command:
$ helm repo update && \
helm fetch kasten/k10 --version=<k10-version>
Installing K10 with Local Helm Chart and Container Images
If the K10 container images were uploaded to a registry at
repo.example.com
, an air-gapped installation can be performed by
setting global.airgapped.repository=repo.example.com
as shown in
the below command:
$ kubectl create namespace kasten-io
$ helm install k10 k10-5.5.3.tgz --namespace kasten-io \
--set global.airgapped.repository=repo.example.com
If it is required to run Red Hat certified version of upstream container
images, this flag can be provided with the helm install
command:
--set global.upstreamCertifiedImages=true
Installing K10 with Disconnected OpenShift Operator
To install K10 with an OpenShift operator in an air-gapped cluster, follow the steps under offline operator install.
Running K10 Within a Local Network
To run K10 in a network without the ability to connect to the internet, K10
needs to be installed in an air-gapped mode with the helm value
metering.mode=airgap
as shown in the command below:
$ kubectl create namespace kasten-io
$ helm install k10 k10-5.5.3.tgz --namespace kasten-io \
--set metering.mode=airgap
Note
If metering.mode=airgap
is not set in an offline cluster, some functionality
will be disabled. A message warning that K10 is "Unable to validate license" will
be displayed in the web based user interface. Errors containing messages
"Could not get google bucket for metrics", "License check failed" and "Unable to validate license"
will be logged.
If the metering service is unable to connect to the internet for 24 hours, the metering service will restart.
Providing Credentials if Local Container Repository is Private
If the local repository that has been provided as the value of
global.airgapped.repository
is private, credentials for that
repository can be provided using secrets.dockerConfig
and
global.imagePullSecret
flags, as below, with
the helm install
command.
--set secrets.dockerConfig=$(base64 -w 0 < ${HOME}/.docker/config.json) \
--set global.imagePullSecret="k10-ecr"
Note
Our Helm chart creates a secret with the name k10-ecr
with the value that has been provided for secrets.dockerConfig
.
That's why we are providing secret name k10-ecr
as value of
global.imagePullSecret
.
Preparing K10 Container Images for Air-Gapped Use
There are multiple ways to use a private repository including setting up a caching or proxy image registry that points to the Kasten K10 image repositories using tools such as JFrog Artifactory. However, if images need to be manually uploaded or an automated upload pipeline is required to add K10 images into your private repository, the following documentation should help.
List K10 Container Images
The following command will list all images used by the current K10 version, This can be helpful if there is a requirement to tag and push K10 images into your private repository manually instead of using the Kasten provided tool documented below.
$ docker run --rm -it gcr.io/kasten-images/k10offline:5.5.3 list-images
Local Pull of all K10 Container Images
The following command will execute the k10offline
tool and use
docker-in-docker (via docker.sock) to
download all K10 images into the local machine's registry.
$ docker run --rm -it -v /var/run/docker.sock:/var/run/docker.sock \
gcr.io/kasten-images/k10offline:5.5.3 pull images
Move K10 Images Into a Private Repository
Finally, to completely automate the download and re-upload of K10
container images, the following command will pull all K10 images into
your local repository, re-tag them for a repository located at
repo.example.com
and push them to this specified registry. Note
that this tool will use your local docker config if the private
registry requires authentication.
Note
K10 uses a few upstream container images. To avoid a
possible collision with a customer's private version, the
k10offline
tool adds the k10-
prefix to these container
images tags.
$ docker run --rm -ti -v /var/run/docker.sock:/var/run/docker.sock \
-v ${HOME}/.docker:/root/.docker \
gcr.io/kasten-images/k10offline:5.5.3 pull images --newrepo repo.example.com
Note
After running the previous command, use the
instructions above to install K10 via images uploaded
to repo.example.com
.
Obtaining Older K10 Versions
The above commands operate against the latest version of K10
(5.5.3). If you want an older version, you can execute the
following to discover older available version number (listed under the
CHART VERSION
column) and the replace the version listed in all
the below commands.
$ helm repo update && \
helm search repo kasten/k10 --versions