1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-15 12:17:56 +00:00
kyverno/documentation/installation.md

46 lines
1.7 KiB
Markdown
Raw Normal View History

2019-05-21 15:50:36 -07:00
<small>*[documentation](/README.md#documentation) / Installation*</small>
2019-05-21 14:44:04 -07:00
2019-05-20 20:43:38 -07:00
# Installation
2019-05-21 16:09:05 -07:00
To install Kyverno in your cluster run the following command on a host with kubectl access:
2019-05-20 20:43:38 -07:00
2019-05-21 16:09:05 -07:00
````sh
kubectl create -f https://github.com/nirmata/kyverno/raw/master/definitions/install.yaml
````
2019-05-20 20:43:38 -07:00
2019-05-21 16:09:05 -07:00
To check the Kyverno controller status, run the command:
2019-05-20 20:43:38 -07:00
2019-05-21 16:09:05 -07:00
````sh
kubectl get pods -n kyverno
````
2019-05-21 14:44:04 -07:00
2019-05-21 16:09:05 -07:00
If the Kyverno controller is not running, you can check its status and logs for errors:
2019-05-21 14:44:04 -07:00
2019-05-21 16:09:05 -07:00
````sh
kubectl describe pod <kyverno-pod-name> -n kyverno
````
2019-05-20 20:43:38 -07:00
2019-05-21 16:09:05 -07:00
````sh
kubectl logs <kyverno-pod-name> -n kyverno
````
2019-05-20 20:43:38 -07:00
2019-05-21 14:44:04 -07:00
# Installing in a Development Environment
2019-05-20 20:43:38 -07:00
2019-05-22 20:26:53 -07:00
To build and run Kyverno in a development environment see: https://github.com/nirmata/kyverno/wiki/Building
2019-05-20 20:43:38 -07:00
To check if the controller is working, find it in the list of kyverno pods:
2019-05-20 20:43:38 -07:00
`kubectl get pods -n kyverno`
2019-05-20 20:43:38 -07:00
2019-05-21 14:44:04 -07:00
# Try Kyverno without a Kubernetes cluster
2019-05-20 20:43:38 -07:00
2019-05-21 16:09:05 -07:00
The [Kyverno CLI](documentation/testing-policies-cli.md) allows you to write and test policies without installing Kyverno in a Kubernetes cluster.
2019-05-20 20:43:38 -07:00
# Pre-Requisites
## Configure controller manager certificate signer
When the cluster ca & key is not passed as arguments(mostly for in-cluster mode), the TLS communicate between admission webhook and api-server a certificate signer configured to issue certificate to a certificate signing request(CSR) generated by Kyverno.
The Kubernetes controller manager provides a default implementation of a signer. To verify if it is enabled, check if the command args --cluster-signing-cert-file and --cluster-signing-key-file are passed to the controller manager with paths to your Certificate Authoritys keypair.
---
2019-05-21 16:09:05 -07:00
<small>*Read Next >> [Writing Policies](/documentation/writing-policies.md)*</small>