FIPS compliance
NetFoundry provides a way for customers to run OpenZiti in FIPS-compliant mode for highly regulated environments.
The easiest way to update NetFoundry Self-Hosted for FIPS compliance is to first run the regular quickstart.sh installer,
and then upgrade the system to use the FIPS-compliant components.
Update to FIPS-compliant Ziti images
-
Copy the YAML file supplied with your customer token for the private docker repo to a file named
netfoundry-<customer_name>-secret.yml. This file is issued by the NetFoundry sales team. -
Add the secret to Kubernetes:
kubectl create -f netfoundry-<customer_name>-secret.yml --namespace=ziti -
Add this to the
controller-values.ymlfile:image:
# use the fips image instead of default
repository: quay.io/netfoundry/ziti-controller-fips
pullSecrets:
- name: netfoundry-<customer_name>-pull-secret -
Add this to the
router-values.ymlfile:image:
# use fips image instead of default
repository: quay.io/netfoundry/ziti-router-fips
pullSecrets:
- name: netfoundry-<customer_name>-pull-secret -
Apply changes for both charts:
helm upgrade --install "ziti-controller" openziti/ziti-controller -n ziti --values ./controller-values.ymlhelm upgrade --install "ziti-router-1" openziti/ziti-router -n ziti --values ./router-values.yml