Ce contenu n'est pas disponible dans la langue sélectionnée.
Chapter 1. Connectivity Link prerequisites and permissions
Before you install Connectivity Link, you must ensure that you have access to the required platforms in your environment with the correct user permissions.
1.1. Required platforms and components Copier lienLien copié sur presse-papiers!
- Red Hat account
- You have a Red Hat account with subscriptions for Connectivity Link and OpenShift.
- OpenShift
- OpenShift Container Platform 4.16 or later is installed, or you have access to a supported OpenShift cloud service.
-
You are logged into an OpenShift cluster with the
cluster-admin
role. -
You have the
kubectl
oroc
command installed.
- OpenShift Service Mesh
- Red Hat OpenShift Service Mesh 3.0 is installed on OpenShift as your Gateway API provider. For more details, see the OpenShift Service Mesh installation documentation.
- You have enabled the Gateway API feature in OpenShift Service Mesh 3.0. For more details, see the OpenShift Service Mesh documentation on enabling Gateway API.
- cert-manager Operator for Red Hat OpenShift
cert-manager Operator for Red Hat OpenShift 1.14 is installed to manage the TLS certificates for your Gateways. For more details, see the cert-manager Operator for Red Hat OpenShift documentation.
NoteBefore using a Connectivity Link TLSPolicy, you must set up a certificate issuer for your cloud provider platform. For more details, see the OpenShift documentation on configuring an ACME issuer.
1.2. Optional platforms and components Copier lienLien copié sur presse-papiers!
- DNSPolicy
For DNSPolicy, you have an account for one of the supported cloud DNS providers and have set up a hosted zone for Connectivity Link. For more details, see your cloud DNS provider documentation:
- RateLimitPolicy
For rate limiting policies, you have a shared accessible Redis-based datastore for rate limit counters in a multicluster environment. For details on how to install and configure a secure and highly available datastore, see the documentation for your Redis-compatible datastore:
- AuthPolicy
- For AuthPolicy, you can install Red Hat build of Keycloak if this is required in your environment. For more details, see the Red Hat build of Keycloak documentation.
- Observability
- For Observability, OpenShift user workload monitoring must be configured to remote write to a central storage system such as Thanos. For more details, see the Connectivity Link Observability Guide.
Additional resources
- For more details, see Supported Configurations for Red Hat Connectivity Link.