Chapter 1. Connectivity Link prerequisites and permissions
Before you install Connectivity Link, you must ensure that you have access to the required platforms in your environment with the correct user permissions.
1.1. Required platforms and components Copy linkLink copied to clipboard!
- Red Hat account
- You have a Red Hat account with subscriptions for Connectivity Link and OpenShift.
- OpenShift
- OpenShift Container Platform 4.17 or later is installed, or you have access to a supported OpenShift cloud service. See OpenShift Container Platform installation documentation.
-
You are logged into an OpenShift cluster with the
cluster-adminrole. You have the
kubectloroccommand installed.ImportantOn OpenShift 4.19 or later, the Gateway API CRDs are provided, and you are no longer required to separately install OpenShift Service Mesh as your Gateway API provider.
However, you must create a
GatewayClassnamedopenshift-defaultand specify acontrollerNameofopenshift.io/gateway-controller/v1. For more details, see the OpenShift documentation on using Gateway API.
- OpenShift Service Mesh
On OpenShift 4.18 or earlier, ensure the following:
- You have Red Hat OpenShift Service Mesh 3.0 separately installed as your Gateway API provider and have created an Istio deployment. See the OpenShift Service Mesh installation documentation.
- You have enabled the Gateway API CRDs in OpenShift Service Mesh 3.0. See the OpenShift Service Mesh documentation on enabling Gateway API.
- cert-manager Operator for Red Hat OpenShift
cert-manager Operator for Red Hat OpenShift 1.15 is installed to manage the TLS certificates for your Gateways. See the cert-manager Operator for Red Hat OpenShift documentation.
NoteBefore using a Connectivity Link TLSPolicy, you must set up a certificate issuer for your cloud provider platform. See the OpenShift documentation on configuring an ACME issuer.
1.2. Optional platforms and components Copy linkLink copied to clipboard!
- DNSPolicy
For DNSPolicy, you have an account for one of the supported cloud DNS providers and have set up a hosted zone for Connectivity Link. For more details, see your cloud DNS provider documentation:
- RateLimitPolicy
For rate limiting policies, you have a shared accessible Redis-based datastore for rate limit counters in a multicluster environment. For details on how to install and configure a secure and highly available datastore, see the documentation for your Redis-compatible datastore:
- AuthPolicy
- For AuthPolicy, you can install Red Hat build of Keycloak if this is required in your environment. For more details, see the Red Hat build of Keycloak documentation.
- Observability
- For Observability, OpenShift user workload monitoring must be configured to remote write to a central storage system such as Thanos. For more details, see the Connectivity Link Observability Guide.
Additional resources
- For more details, see Supported Configurations for Red Hat Connectivity Link.