- Edit the Infrastructure layer
${GITOPS_PROFILE}/1-infra/kustomization.yaml
and un-comment the following:- argocd/consolenotification.yaml - argocd/namespace-ibm-common-services.yaml - argocd/namespace-tools.yaml - argocd/namespace-openshift-serverless.yaml - argocd/namespace-knative-eventing.yaml - argocd/namespace-knative-serving.yaml - argocd/namespace-knative-serving-ingress.yaml
-
Edit the CP4SThreatManagements custom resource instance and specify a block or file storage class
${GITOPS_PROFILE}/2-services/argocd/instances/ibm-cp4sthreatmanagements-instance.yaml
. The default is set tomanaged-nfs-storage
.- name: spec.basicDeploymentConfiguration.storageClass value: managed-nfs-storage - name: spec.extendedDeploymentConfiguration.backupStorageClass value: managed-nfs-storage
-
Edit the Services layer
${GITOPS_PROFILE}/2-services/kustomization.yaml
uncomment the following:- argocd/operators/ibm-cp4s-operator.yaml - argocd/instances/ibm-cp4sthreatmanagements-instance.yaml - argocd/operators/ibm-foundations.yaml - argocd/instances/ibm-foundational-services-instance.yaml - argocd/operators/ibm-automation-foundation-core-operator.yaml - argocd/operators/ibm-catalogs.yaml - argocd/operators/openshift-serverless.yaml - argocd/instances/openshift-serverless-knative-serving-instance.yaml
-
Check the status of the
CommonService
andPlatformNavigator
custom resource.oc get CP4SThreatManagement threatmgmt -n tools -o jsonpath='{.status.conditions}' # Expected output = Cloudpak for Security Deployment is successful
-
Before users can log in to the console for Cloud Pak for Security, an identity provider must be configured. The documentation provides further instructions. For DEMO purposes, OpenLDAP can be deployed and instructions are provided below.
-
Download the cpctl utility
- Log in to the OpenShift cluster
oc login --token=<token> --server=<openshift_url> -n <namespace>
- Retrieve the pod that contains the utility
POD=$(oc get pod --no-headers -lrun=cp-serviceability | cut -d' ' -f1)
- Copy the utility locally
oc cp $POD:/opt/bin/<operatingsystem>/cpctl ./cpctl && chmod +x ./cpctl
-
Install OpenLDAP
- Start a session
./cpctl load
- Install OpenLDAP
cpctl tools deploy_openldap --token $(oc whoami -t) --ldap_usernames 'adminUser,user1,user2,user3' --ldap_password cloudpak
-
Initial user log in
- Retrieve Cloud Pak for Security Console URL
oc get route isc-route-default --no-headers -n <CP4S_NAMESPACE> | awk '{print $2}'
- Log in with the user ID and password specified (ie.
adminUser
/cloudpak
).