Enable FIPS compliance
NetFoundry provides a way for customers to run OpenZiti in FIPS-compliant mode for highly regulated environments.
The easiest way to update NetFoundry Self-Hosted for FIPS compliance is to first run the regular nf-quickstart
installer, and then upgrade the system to use the FIPS-compliant components.
Update to FIPS-compliant Ziti images
-
Copy the YAML file supplied with your customer token for the private docker repo to a file named
netfoundry-<customer_name>-secret.yml. This file is issued by the NetFoundry sales team. -
Add the secret to Kubernetes:
kubectl create -f netfoundry-<customer_name>-secret.yml --namespace=ziti -
Add this to the
controller-values.ymlfile:image:# use the fips image instead of defaultrepository: quay.io/netfoundry/ziti-controller-fipspullSecrets:- name: netfoundry-<customer_name>-pull-secret -
Add this to the
router-values.ymlfile:image:# use fips image instead of defaultrepository: quay.io/netfoundry/ziti-router-fipspullSecrets:- name: netfoundry-<customer_name>-pull-secret -
Apply changes for both charts:
helm upgrade --install "ziti-controller" openziti/ziti-controller -n ziti --values ./controller-values.ymlhelm upgrade --install "ziti-router-1" openziti/ziti-router -n ziti --values ./router-values.yml