This is a cache of https://docs.openshift.com/container-platform/4.16/security/nbde_tang_server_operator/nbde-tang-server-operator-identifying-url.html. It is a snapshot of the page at 2024-11-27T09:10:29.208+0000.
Identifying URL of a Tang server deployed with the NBDE Tang Server Operator - NBDE Tang Server Operator | Security and compliance | OpenShift Container Platform 4.16
×

Before you can configure your Clevis clients to use encryption keys advertised by your Tang servers, you must identify the URLs of the servers.

Identifying URL of the NBDE Tang Server Operator using the web console

You can identify the URLs of Tang servers deployed with the NBDE Tang Server Operator from the OperatorHub by using the OpenShift Container Platform web console. After you identify the URLs, you use the clevis luks bind command on your clients containing LUKS-encrypted volumes that you want to unlock automatically by using keys advertised by the Tang servers. See the Configuring manual enrollment of LUKS-encrypted volumes section in the RHEL 9 Security hardening document for detailed steps describing the configuration of clients with Clevis.

Prerequisites
  • You must have cluster-admin privileges on an OpenShift Container Platform cluster.

  • You deployed a Tang server by using the NBDE Tang Server Operator on your OpenShift cluster.

Procedure
  1. In the OpenShift Container Platform web console, navigate to OperatorsInstalled OperatorsTang Server.

  2. On the NBDE Tang Server Operator details page, select Tang Server.

    NBDE Tang Server Operator details
  3. The list of Tang servers deployed and available for your cluster appears. click the name of the Tang server you want to bind with a Clevis client.

  4. The web console displays an overview of the selected Tang server. You can find the URL of your Tang server in the Tang Server External Url section of the screen:

    NBDE Tang Server Operator overview of a Tang server

    In this example, the URL of the Tang server is http://34.28.173.205:7500.

Verification
  • You can check that the Tang server is advertising by using curl, wget, or similar tools, for example:

    $ curl 2> /dev/null http://34.28.173.205:7500/adv  | jq
    Example output
    {
      "payload": "eyJrZXlzIj…eSJdfV19",
      "protected": "eyJhbGciOiJFUzUxMiIsImN0eSI6Imp3ay1zZXQranNvbiJ9",
      "signature": "AUB0qSFx0FJLeTU…aV_GYWlDx50vCXKNyMMCRx"
    }

Identifying URL of the NBDE Tang Server Operator using cli

You can identify the URLs of Tang servers deployed with the NBDE Tang Server Operator from the OperatorHub by using the cli. After you identify the URLs, you use the clevis luks bind command on your clients containing LUKS-encrypted volumes that you want to unlock automatically by using keys advertised by the Tang servers. See the Configuring manual enrollment of LUKS-encrypted volumes section in the RHEL 9 Security hardening document for detailed steps describing the configuration of clients with Clevis.

Prerequisites
  • You must have cluster-admin privileges on an OpenShift Container Platform cluster.

  • You have installed the OpenShift cli (oc).

  • You deployed a Tang server by using the NBDE Tang Server Operator on your OpenShift cluster.

Procedure
  1. List details about your Tang server, for example:

    $ oc -n nbde describe tangserver
    Example output
    …
    Spec:
    …
    Status:
      Ready:                 1
      Running:               1
      Service External URL:  http://34.28.173.205:7500/adv
      Tang Server Error:     No
    Events:
    …
  2. Use the value of the Service External URL: item without the /adv part. In this example, the URL of the Tang server is http://34.28.173.205:7500.

Verification
  • You can check that the Tang server is advertising by using curl, wget, or similar tools, for example:

    $ curl 2> /dev/null http://34.28.173.205:7500/adv  | jq
    Example output
    {
      "payload": "eyJrZXlzIj…eSJdfV19",
      "protected": "eyJhbGciOiJFUzUxMiIsImN0eSI6Imp3ay1zZXQranNvbiJ9",
      "signature": "AUB0qSFx0FJLeTU…aV_GYWlDx50vCXKNyMMCRx"
    }

Additional resources