Skip to content

Enabling KUMA Service Mesh (Optional)

For enhancing security in the Kubernetes deployment, use KUMA Service Mesh to enable mTLS between services. To learn more about KUMA visit their documentation.

Install KUMA w/ Helm

Follow the instructions for installing KUMA with helm.

Create Service Mesh

After KUMA is installed, next create a service mesh with mTLS enabled:

echo "apiVersion: kuma.io/v1alpha1
kind: Mesh
metadata: 
  name: open-amt-cloud-toolkit-mesh
spec: 
  mtls: 
    enabledBackend: open-amt-cloud-toolkit-cert
    backends: 
      - name: open-amt-cloud-toolkit-cert
        type: builtin
    enabled: true" | kubectl apply -f -

Turn On Sidecar Injection

After the mesh is created, turn on sidecar-injection for the open-amt-cloud-toolkit services with:

echo "apiVersion: v1
kind: Namespace
metadata: 
  name: default
  namespace: default
  annotations: 
    kuma.io/sidecar-injection: enabled
    kuma.io/mesh: open-amt-cloud-toolkit-mesh" | kubectl apply -f -

Delete all pods to ensure updated annotations from previous command take effect:

kubectl delete pod --all -n default

Configure Traffic Permissions

Finally, we need to allow traffic between services:

echo "apiVersion: kuma.io/v1alpha1
kind: TrafficPermission
mesh: open-amt-cloud-toolkit-mesh
metadata:
  namespace: default
  name: allow-all-open-amt-cloud-toolkit-mesh
spec:
  sources:
    - match:
        kuma.io/service: '*'
  destinations:
    - match:
        kuma.io/service: '*'" | kubectl apply -f -

After applying traffic permissions, you should now be able to use the Open AMT Cloud Toolkit and continue logging into the web portal following the setup instructions in the Getting Started section.