Deploying TKS on Podman - dogtagpki/pki GitHub Wiki

Overview

Note
This page is still under construction.

This document describes the process to deploy TKS container on Podman with PKI 11.6 or later.

Current limitations:

  • Replication is not yet supported (i.e. no scaling)

  • HSM is not yet supported

  • No security domain (i.e. other subsystems need to be set up manually)

  • Long startup time (due to certs import and instance creation)

Creating Network

Create a network for the containers, for example:

$ podman network create example

Alternatively, use an existing network.

Preparing Certificates

To deploy the OCSP container, prepare the following files:

Then store the files in a location that will be mapped to the /certs folder in the TKS container.

See also:

Preparing Configuration Files

Create a folder (e.g. conf) to store Tomcat and TKS configuration files. This folder will be mapped into the /conf folder in the TKS container.

Preparing Logs Folder

Create a folder (e.g. logs) to store Tomcat and TKS log files. This folder will be mapped into the /logs folder in the TKS container.

Deploying TKS Container

Run the TKS container with the following command:

$ podman run \
    --name tks \
    --hostname tks.example.com \
    --network example \
    --network-alias tks.example.com \
    -v $PWD/certs:/certs \
    -v $PWD/conf:/conf \
    -v $PWD/logs:/logs \
    -e PKI_DS_URL=ldap://ds.example.com:3389 \
    -e PKI_DS_PASSWORD=Secret.123 \
    -d \
    quay.io/dogtagpki/pki-tks:latest

Wait until the TKS service is running:

$ podman logs -f tks

Setting up TKS Database

Setting up TKS Admin User

Removing TKS Container

If the TKS container is no longer needed, it can be removed with the following command:

$ podman rm -f tks
⚠️ **GitHub.com Fallback** ⚠️