OPENSHIFT , SECURITY

New Relic on OpenShift 4

#New Relic

New Relic on OpenShift 4

Follow the instructions on New Relic’s website:

Modified here. There is no need for adding the MutatingAdmissionWebhook as this is already enabled by default in OCP 4, so skip that section.

  1. Download the YAML file:

    curl -O http://download.newrelic.com/infrastructure_agent/integrations/kubernetes/k8s-metadata-injection-latest.yaml
  2. Replace YOUR_CLUSTER_NAME with the name of your cluster in the YAML file.

  3. Apply the YAML file to your Kubernetes cluster:

    oc apply -f k8s-metadata-injection-latest.yaml

Now fix their issue with failed TLS authentication:

LATEST_CSR_SIGNER=$(oc get secret -n openshift-kube-controller-manager --sort-by=.metadata.creationTimestamp | grep csr-signer | tail -1)
echo $LATEST_CSR_SIGNER
LATEST_CSR_CA=$(oc get secret $LATEST_CSR_SIGNER -n openshift-kube-controller-manager  -o jsonpath='{.data.tls\.crt}')
echo $LATEST_CSR_CA
oc patch mutatingwebhookconfiguration newrelic-metadata-injection-cfg -n default -p '{"webhooks":[{"name":"metadata-injection.newrelic.com","clientConfig":{"caBundle":"'${LATEST_CSR_CA}'"}}]}'

Note that this may need to be updated as csr-signer rotates.