Skip to main content

Illumio Core 21.5 Install, Configure, Upgrade

Deploy Kubelink in Your Cluster

Download the required resources such as, Kubelink docker image, secret, and deployment files from the Illumio Support portal (login required).

Prerequisites
  • Kubelink deployment file provided by Illumio.

  • Kubelink secret file provided by Illumio.

  • Illumio's Kubelink docker image uploaded to your private docker registry.

Configure the Kubelink Secret

This section assumes that you have created a Container Cluster object in the PCE. You will need the Cluster ID and Cluster Token values for the Kubelink secret.

  1. Open the Kubelink secret YAML file and modify the following keys that are listed under stringData:

    1. ilo_server = the PCE URL and port. Example: https://mypce.example.com:8443

    2. ilo_cluster_uuid = Cluster ID value from previous step. Example: 15643adc-ac09-40f2-be63-fd9a261f41cc

    3. ilo_cluster_token = Cluster Token from previous step. Example: 1_e94c116a4485ab1bb8560728afd6a332182b849c841297f63e73a87bf255cc96

    4. ignore_cert = SSL verification. The value is boolean and is recommended to be set to false so that Kubelink requires PCE certificate verification. Example: 'false'

    5. log_level = Log level where '0' for debug, '1' for info, '2' for warn, or '3' for error. Example: '1'

    Important

    Illumio does not recommend turning off SSL verification (ignore_cert: 'true'). However, this is an option for deployments in which the PCE uses a self-signed certificate. For PCE deployments using a certificate signed with a private PKI, there is no need to set the ignore_cert key to 'false'. For more details, see Create a ConfigMap to Store Your Root CA Certificate.

    The contents of a modified illumio-kubelink-secret.yml file are shown below.

    #
    # Copyright 2013-2021 Illumio, Inc. All Rights Reserved.
    #
     
    apiVersion: v1
    kind: Secret
    metadata:
      name: illumio-config
      namespace: illumio-system
    type: Opaque
    stringData:
      ilo_server: https://mypce.example.com:8443 # 
      Example: https://mypce.example.com:8443
      ilo_cluster_uuid: 42083a4d-dd92-49e6-b495-6f84a940073c 
     # Example: cc4997c1-408b-4f1d-a72b-91495c24c6a0
      ilo_cluster_token: 
      10_d1ea040af1fb0ef60d2660fa093cfb9fad46462a33b887c9ba8a3e3bac1a95d 
     # Example: 170b8aa3dd6d8aa3c284e9ea016e8653f7b51cb4b0431d8cbdba115
      08763f3a3
      ignore_cert: 'false' # Set to 'true' to ignore the PCE certificate
      log_level: '1' # Default log level is info

    Note

    If you are going to use a private PKI to sign the PCE certificate, see Create a ConfigMap to Store Your Root CA Certificate before deploying Kubelink.

  2. Save the changes.

  3. Create the Kubelink secret in your Kubernetes or OpenShift cluster.

    • Deploy Kubelink secret in Kubernetes:

    kubectl apply -f illumio-kubelink-secret.yml
    • Deploy Kubelink secret in OpenShift:

    oc apply -f illumio-kubelink-secret.yml
  4. Verify the Kubelink secret creation in your Kubernetes cluster.

    • Verify Kubelink secret in Kubernetes:

    kubectl get secret -n illumio-system
    • Verify Kubelink secret in OpenShift:

    oc get secret -n illumio-system