Home > Storage > PowerFlex > White Papers > Container Storage Modules for Dell PowerFlex : Authorization Module > Deploying the Authorization module
Steps to deploy the Authorization module:
$ git clone https://github.com/dell/helm-charts.git
$ kubectl create namespace authorization
cd /root/CSM_Modules/helm-charts/samples/csm-authorization
$ vi config.yaml
$ kubectl create secret generic karavi-config-secret -n authorization --from-file=config.yaml=samples/csm-authorization/config.yaml
$ cp charts/csm-authorization/values.yaml myvalues.yaml
$ vi /root/CSM_Modules/helm-charts/myvalues.yaml
ingress-nginx:
enabled: true # Enable this if using nginx
# the role-service ingress will use role.hostname
hostname: csm-authorization.com #Change as per requirement
hosts:
- authorization-ingress-nginx-controller.authorization.svc.cluster.local
Note: While updating the configuration file, if the default ingress controller nginx is used, then hosts should be updated (as observed above) to indicate the application and namespaces.
$ helm -n authorization install authorization -f myvalues.yaml charts/csm-authorization
$ kubectl get pods -n authorization
NAME READY STATUS RESTARTS AGE
authorization-cert-manager 1/1 Running 0 45s
authorization-cert-manager-cainjector 1/1 Running 0 44s
authorization-cert-manager-webhook 1/1 Running 0 44s
authorization-ingress-nginx-controller 1/1 Running 0 44s
proxy-server-8c758975c 3/3 Running 0 44s
redis-commander 1/1 Running 0 45s
redis-primary 1/1 Running 0 45s
role-service 1/1 Running 0 45s
storage-service 1/1 Running 0 44s
tenant-service 1/1 Running 0 45s
Note: The pod redis-primary will be in pending state until a local PV is created. Check the event logs to verify for any errors during the installation of the authorization module. If a certificate manager is not available, then the Kubernetes certificate manager needs to be installed.
The installation of the authorization module is complete.
For more information about the Authorization module, such as deployment methods, supported operating system design, and so on, see the Authorization documentation.