To prepare to install the solution in a private corporate network:
export CHART_URL="xxxxxx"
export CHART_USERNAME="xxxxxx"export CHART_PASSWORD="xxxxxx"
export VERSION="xxxxxx"
The CHART_URL, CHART_USERNAME, CHART_PASSWORD, and VERSION values are provided by the vendor.
Example connection of a repository with Helm Chart:
helm registry login \
--username $CHART_USERNAME \
--password $CHART_PASSWORD
$CHART_URL
helm pull oci://$CHART_URL/charts/kcs --version $VERSION
tar xvf kcs-$VERSION.tgz
We do not recommend specifying account data in the values.yaml file to be used when launching the Helm Chart package.
You can use one of the following secure methods to manage secrets:
The pull-secret values for Docker Registry cannot be fully stored in HashiCorp Vault. We recommend that you specify the pull-secret values manually in the section with the Kubernetes cluster parameters and reference them from the Helm Chart.
The following main installation settings must be specified in the values.yaml file:
helm upgrade --install kcs . \
--create-namespace \
--namespace kcs \
--values values.yaml \
--set default.domain="kcs.example.domain.ru" \
When network policies are enabled, you must specify at least one namespace for the cluster ingress controller.
--set default.networkPolicies.ingressControllerNamespaces="{ingress-nginx}" \
By default, network policies are enabled.
--set secret.infracreds.envs.POSTGRES_USER="user" \
--set-string secret.infracreds.envs.POSTGRES_PASSWORD="pass" \
--set secret.infracreds.envs.MINIO_ROOT_USER="user" \
--set-string secret.infracreds.envs.MINIO_ROOT_PASSWORD="password" \
--set-string secret.infracreds.envs.CLICKHOUSE_ADMIN_PASSWORD="pass" \
--set secret.infracreds.envs.MCHD_USER="user" \
--set-string secret.infracreds.envs.MCHD_PASS="pass" \
To ensure security, the solution components must use credentials generated by the system administrator independently in accordance with corporate security policies. When deploying the target component within a solution, the specified user and password are automatically created. When using a third-party service, you must provide the username and password created by the administrator in the said service.
--set pullSecret.kcs-pullsecret.username="user" \
--set pullSecret.kcs-pullsecret.password="pass"
If you plan to deploy the system using a Kaspersky registry, you must specify the credentials provided to you when you purchased Kaspersky Container Security. If you plan to use a private registry or a proxy registry, you must specify your registry credentials.
We recommend not to change the composition of the basic installation settings.
--set default.postgresql.external="true"
--set configmap.infraconfig.envs.postgres_host="<IP address or FQDN of PostgresSQL DBMS>"
--set configmap.infraconfig.envs.postgres_port="<port for connection to PostgresSQL DBMS; by default, port 5432 is used>"
--set configmap.infraconfig.envs.postgres_db_name="name of the database created by the PostgresSQL DBMS administrator, api is used by default>"
You should also ask the PostgreSQL DBMS administrator to clarify the requirements for the DBMS server certificates verification. Kaspersky Container Security supports the following verification modes:
If you need to verify the certificate of an external PostgresSQL DBMS, do the following: