This Helm chart will deploy Virtru’s Customer Key Server (CKS). You can read this documentation on Virtru’s support site here:
virtru
These are the requirements before getting started with this chart:
kubectl
There are a number of ways that Kubernetes secrets can be managed. If you do not have an existing external secret manager for your Kubernetes clusters, you can create secrets by using the appSecrets
section of the values.yaml
file.
Please note we strongly advise you consider using an external secrets manager. Creating secrets via the values.yaml
is a default option to help get your CKS up and running more quickly.
values.yaml
fileThis section will detail potential changes that you will need to make to your values.yaml
file.
ingress
To serve traffic appropriately, you must have an ingress controller for your CKS service. This is enabled by default, but you will need to update the host under ingress.hosts.host
to match the FQDN of your CKS.
Depending on your environment, you will need to add annotations to:
appSecrets
Update your secrets to match the values from your local CKS config as mapped below.
Filename | Value from CKS setup script |
---|---|
hmac-auth |
env/cks.env => AUTH_TOKEN_STORAGE_IN_MEMORY_TOKEN_JSON |
rsa001.pub |
keys/rsa001.pub |
rsa001.pem |
keys/rsa001.pem |
You can have multiple RSA keypairs on your CKS as long as they follow the naming convention rsa###.pub and rsa###.pem for all public/private keypairs.
Note: Indentation matters for a multiline string, ensure proper indentation for your CKS keys secrets.
Use a standard helm install command to deploy your CKS. An example command is listed below:
helm install -n virtru -f ./values.yaml cks ./ --create-namespace