Install on OpenShift with Helm
The Kong Gateway software is governed by the . Kong Gateway (OSS) is licensed under an Apache 2.0 license.
- A Kubernetes cluster, v1.19 or later
- v1.19 or later
- (Enterprise only) A
license.json
file from Kong - Helm 3
Create namespace
Create the namespace for Kong Gateway with Kubernetes Ingress Controller. For example:
Create license secret
Save your license file temporarily with the filename
license
(no file extension).Run:
oc create secret generic kong-enterprise-license -n kong --from-file=./license
Update Helm:
helm repo update
Create secret for RBAC superuser (recommended)
If you plan to use RBAC, you must create the superuser account at this step in installation. You cannot create it later.
Create the RBAC account.
Create the secret:
oc create secret generic kong-enterprise-superuser-password \
-n kong \
--from-literal=password={your-password}
Create secret for Session plugin
Create a session config file for Kong Manager:
$ echo '{"cookie_name":"admin_session","cookie_samesite":"off","secret":"<your-password>","cookie_secure":false,"storage":"kong"}' > admin_gui_session_conf
Create a session config file for Kong Dev Portal:
Or, if you have different subdomains for the
portal_api_url
andportal_gui_host
, set the andcookie_samesite
properties as follows:$ echo '{"cookie_name":"portal_session","cookie_samesite":"off","cookie_domain":"<.your_subdomain.com">,"secret":"<your-password>","cookie_secure":false,"storage":"kong"}' > portal_session_conf
Create the secret:
For Kong Manager only:
oc create secret generic kong-session-config \
-n kong \
--from-file=admin_gui_session_conf
For Kong Manager and Dev Portal:
oc create secret generic kong-session-config \
--from-file=admin_gui_session_conf \
--from-file=portal_session_conf
Create a values.yaml
file to provide required values such as password secrets or optional email addresses for notifications. Work from the . The example file includes comments to explain which values you must set. The readme in the charts repository includes an exhaustive list of all possible configuration properties.
Note that this deployment includes a Postgres sub-chart provided by Bitnami. You might need to delete the PersistentVolume objects for Postgres in your Kubernetes cluster to connect to the database after install.
Deploy Kong Gateway with Kubernetes Ingress Controller
Run:
helm install my-kong kong/kong -n kong --values ./values.yaml
Check pod status, and make sure the pod is running:
oc get pods -n kong
Finalize configuration and verify installation
Run:
Copy the IP address from the output, then add the following to the
.env
section of yourvalues.yaml
file:admin_api_uri: <your-DNS-or-IP>
Clean up:
oc delete jobs -n kong --all
Update with changed
values.yaml
:helm upgrade my-kong kong/kong -n kong --values ./values.yaml
After the upgrade finishes, run:
oc get svc -n kong
The output includes
EXTERNAL-IP
values for Kong Manager and Dev Portal. For example:NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
my-kong-kong-manager LoadBalancer 10.96.61.116 10.96.61.116 8002:31308/TCP,8445:32420/TCP 24m
See the for how-to guides, reference guides, and more.