Installing IBM Guardium Cryptography Manager 1.0.0.0
You can install IBM Guardium® Cryptography Manager 1.0.0.0 using Helm.
Before you begin
- System requirements and prerequisites
- Registration for a Red Hat subscription
- Helm with version 3.x
- Rook for Ceph storage
- Run the following command to ensure that your cluster storage is in a healthy
state:
kubectl get cephcluster -n rook-cephYou should get the status of
HEALTH_OKfor theHEALTHparameter.NAME DATADIRHOSTPATH MONCOUNT AGE PHASE MESSAGE HEALTH EXTERNAL FSID my-cluster /var/lib/rook 1 2m39s Ready Cluster created successfully HEALTH_OK 67835dbb-1f29-48c9-b880-239760d9469a - For successful connectivity and operation of the deployed application, ensure that the following
ports are explicitly allowed in your firewall or network access rules:
- TCP Port of the OIDC server.
- TCP Port 31443 for IAG host.
Note: By default (
<global-values.yaml>externalOidc = false), Keycloak gets
installed as the internal OIDC server. If you choose to use the internal Keycloak as OIDC server,
the default OIDC port will be 30443. It is recommended to configure any external OIDC server for
production use. Internal Keycloak should be used only for Development and Test
environments.About this task
Procedure
Results
You can uninstall Helm due to any of the following conditions:
- You want to uninstall the deployment
- You want to clear the cluster before a fresh installation
If you need to uninstall Helm, run the following command:
cd helm-charts
./installer.sh uninstall
Warning: The cleanup process of Helm deletes all resources of Guardium Cryptography Manager.
You can cleanup Helm when you need to cleanup resources in the clusters where Guardium Cryptography Manager is deployed.
If you need to cleanup Helm, run the following command:
cd helm-charts
./helm-cleanup.sh
What to do next
After installing Guardium Cryptography Manager, complete the following tasks:
- Validate the deployment of by doing these steps:
- Run the following command to check the Helm
releases:
helm ls --namespace gcmapp - Run the following command to verify
pods:
kubectl get pods --namespace gcmapp - Run the following command to check the logs of
pods:
kubectl logs -f <pod-name> --namespace gcmapp
- Run the following command to check the Helm
releases:
- Open the Guardium Cryptography Manager
application by using either of the following URLs:
- If the Guardium Cryptography Manager application is installed in a Kubernetes cluster, use the URL, https://<ip_address>:31443
- If the Guardium Cryptography Manager application is installed in an OCP cluster, use the URL, https://<route_url>
- Log in to the Guardium Cryptography Manager
user interface by using the following credentials:
- Username:
gcmadmin - Password:
gcmAdmin@123
- Username:
- On the Guardium Cryptography Manager, click Help>About>Version, and verify that the version is as required.
- To validate OIDC server access, log in using either of the following URLs with username as
gcmadminand password asgcmsecret, and then verify that the gcmadmin exists:- Use https://<ip-address>:<OIDC server port> for Kubernetes cluster
- Use https://<route-url> for OCP cluster
Log in by using the following credentials:
- Username:
gcmadmin - Password:
gcmsecret
