Enabling the Security Profiles Operator
Before you can use the Security Profiles Operator, you must ensure the Operator is deployed in the cluster.
Installing the Security Profiles Operator
Prerequisites
- You must have
admin
privileges.
Procedure
In the OKD web console, navigate to Operators → OperatorHub.
Search for the Security Profiles Operator, then click Install.
Keep the default selection of Installation mode and namespace to ensure that the Operator will be installed to the
openshift-security-profiles
namespace.Click Install.
Verification
To confirm that the installation is successful:
Navigate to the Operators → Installed Operators page.
Check that the Security Profiles Operator is installed in the
openshift-security-profiles
namespace and its status isSucceeded
.
If the Operator is not installed successfully:
Navigate to the Operators → Installed Operators page and inspect the
Status
column for any errors or failures.Navigate to the Workloads → Pods page and check the logs in any pods in the
openshift-security-profiles
project that are reporting issues.
Installing the Security Profiles Operator using the CLI
Prerequisites
- You must have
admin
privileges.
Procedure
Define a
Namespace
object:Example
namespace-object.yaml
apiVersion: v1
kind: Namespace
metadata:
name: openshift-security-profiles
labels:
openshift.io/cluster-monitoring: "true"
Create the
Namespace
object:$ oc create -f namespace-object.yaml
Define an
OperatorGroup
object:Example
operator-group-object.yaml
apiVersion: operators.coreos.com/v1
kind: OperatorGroup
metadata:
name: security-profiles-operator
namespace: openshift-security-profiles
Create the
OperatorGroup
object:$ oc create -f operator-group-object.yaml
Define a
Subscription
object:Example
subscription-object.yaml
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
name: security-profiles-operator-sub
namespace: openshift-security-profiles
spec:
channel: release-alpha-rhel-8
installPlanApproval: Automatic
name: security-profiles-operator
source: redhat-operators
sourceNamespace: openshift-marketplace
Create the
Subscription
object:$ oc create -f subscription-object.yaml
If you are setting the global scheduler feature and enable |
Verification
Verify the installation succeeded by inspecting the following CSV file:
$ oc get csv -n openshift-security-profiles
Verify that the Security Profiles Operator is operational by running the following command:
$ oc get deploy -n openshift-security-profiles
Configuring logging verbosity
The Security Profiles Operator supports the default logging verbosity of 0
and an enhanced verbosity of 1
.
Procedure
To enable enhanced logging verbosity, patch the
spod
configuration and adjust the value by running the following command:$ oc -n openshift-security-profiles patch spod \
spod --type=merge -p '{"spec":{"verbosity":1}}'
Example output
securityprofilesoperatordaemon.security-profiles-operator.x-k8s.io/spod patched