Welcome to the Kerberos Vault Edge installation. This is the way to go if you want to install Kerberos Vault on your Baremetal infrastructure or inside your Private Cloud.
Before we can actual start installing the different deployments in our cluster, we need to make sure we have one available.
Kerberos Vault is the storage component for Kerberos Enterprise. It is used to store your recordings at a central place, in the storage system you prefer. Next to that it can be used for extension and integration capabilities. Learn more about Kerberos Vault here.
To use Kerberos Vault, you will need to have Kerberos Enterprise installed, and deployments running. Independent from that one can also use the Kerberos Vault API
/swagger/index.html to send recordings from a custom build VMS.
Similar to Kerberos Enterprise, Kerberos Vault, requires some initial components to be installed. If you will run Kerberos Vault in the same cluster as where you have Kerberos Enterprise running, there is not much to do.
However if you plan to run Kerberos Vault in a different cluster (which is perfectly possible), you will need to make sure you complete the initial setup of Kerberos Enterprise Edge installation. To be more specific you will need the following components running:
Once this is done start by cloning the configurations from our Github repo.
git clone https://github.com/kerberos-io/storage
Similar to Kerberos Enterprise, Kerberos Vault is managed through a web app. It allows you to add storage providers (S3, minio, etc), add queues for messaging, accounts for security and much more. It also comes with API’s, which you can use to interact and retrieve information from Kerberos Vault. All is documented in the form of Swagger APIs
Before installing Kerberos Vault, open the
./storage/yaml/deployment.yaml configuration file. At the bottom file you will find two endpoints, similar to the Traefik config file below. Update the domain names to your own domain, and add these to your DNS server or
/etc/hosts file (and point to the same IP as the Traefik EXTERNAL-IP).
spec: rules: --> - host: storage.domain.com http: paths: - path: / backend: serviceName: kerberos-storage servicePort: 80 --> - host: api.storage.domain.com http: paths: - path: / backend: serviceName: kerberos-storage servicePort: 8081
Next to that modify the MongoDB credentials, and make sure they match the credentials of your MongoDB instance.
- name: MONGODB_USERNAME value: "root" - name: MONGODB_PASSWORD --> value: "xxxxxxxxxx"
Once you have corrected the DNS names and MongoDB credentials, install Kerberos Vault inside your cluster.
kubectl apply -f ./storage/yaml/deployment.yaml -n kerberos
Test out configuration
If everything worked out as expected, you should now have following services in your cluster:
- Enterprise (optional)
It should look like this.
$ kubectl get pods NAME READY STATUS RESTARTS AGE kerberos-storage-6f5c877d7c-hf77p 1/1 Running 0 2d11h mongodb-55566dc65c-xgmns 2/2 Running 0 4d13h traefik-7d566ccc47-mwslb 1/1 Running 0 4d12h
Access the system
Once everything is configured correctly your cluster and DNS or
/etc/hosts file, you should be able to access the Storage application. By navigating to the Storage domain
storage.domain.com in your browser you will see the Storage login page showing up.