Install NGINX Gateway Fabric on OpenShift
This guide details how to install F5 NGINX Gateway Fabric on Red Hat OpenShift through OperatorHub. You can then configure it with the NginxGatewayFabric custom resource.
Before starting, we recommend you have the following:
-
A running Red Hat OpenShift cluster with cluster administrator privileges.
-
Ability to pull images from
ghcr.io(or a mirrored registry if required by your environment). -
Optional integrations
- F5 NGINX One dataplane API key if you plan to integrate with F5 NGINX One Console.
- F5 NGINX Plus entitlements if you plan to run NGINX Gateway Fabric with F5 NGINX Plus.
NGINX Gateway Fabric provides first-class OpenShift support with Universal Base Image (UBI)-based images. Use the -ubi tags shown in the custom resource definition (CRD) examples. Defaults are compatible with OpenShift Security Context Constraints (SCCs) for non-root operation. If your cluster enforces custom SCCs or policies, bind the appropriate SCC to NGINX Gateway Fabric service accounts.
This section covers the necessary steps to have NGINX Gateway Fabric fully running in an OpenShift environment when installing through the OperatorHub
- Navigate to the Red Hat Catalog: https://catalog.redhat.com/en
- Search for "NGINX Gateway Fabric Operator" in the searchbar at the top
- Select NGINX Gateway Fabric Operator
- Select Deploy & use
- Choose the appropriate architecture and release tag
- Complete the installation. Wait until the Operator status shows Installed
In your cluster, create a dedicated project (namespace) for NGINX Gateway Fabric components.
oc new-project nginx-gateway-fabricIf you want NGINX Gateway Fabric to auto-generate internal certificates, skip this step. To provide your own TLS secrets, create the following:
Agent TLS (used by internal agent)
oc create secret tls agent-tls \
--cert=agent.crt \
--key=agent.key \
-n nginx-gateway-fabricServer TLS (used by internal server)
oc create secret tls server-tls \
--cert=server.crt \
--key=server.key \
-n nginx-gateway-fabric- Navigate to the "Installed Operators" section and select the "NGINX Gateway Fabric" Operator
- To create a new
NginxGatewayFabricresource, select the tab labeled "NginxGatewayFabric" - Next, select "Create NginxGatewayFabric"
- In this menue you will see "Forum view" and "YAML view". Select "YAML view"
- You will now see a YAML configuration for the
NginxGatewayFabricresource - Near the bottom, press the "Create" button
If you want to use NGINX One Console to monitor NGINX Gateway Fabric, create a secret for the dataplane key (replace VALUE with your key).
oc create secret generic nginxone-dataplane-key \
--from-literal=key=VALUE \
-n nginx-gateway-fabricReference this secret in spec.nginx.nginxOneConsole.dataplaneKeySecretName in your NginxGatewayFabric resource.
If you plan to use NGINX Plus, set spec.nginx.plus: true in your NginxGatewayFabric resource. Add image pull credentials, and create a license secret if needed.
Example license secret name referenced by usage.secretName
oc create secret generic nplus-license \
--from-file=nginx-repo.crt=/path/to/nginx-repo.crt \
--from-file=nginx-repo.key=/path/to/nginx-repo.key \
-n nginx-gateway-fabricChoose one exposure option:
If a LoadBalancer is available, set spec.nginx.service.type: LoadBalancer. Optionally set:
externalTrafficPolicy: Localto preserve client source IPs.loadBalancerClass,loadBalancerIP, andloadBalancerSourceRangesper your environment.
If a LoadBalancer is not available, set spec.nginx.service.type: NodePort, then create an OpenShift Route to the NGINX Gateway Fabric front-end Service (for HTTP/HTTPS traffic):
oc create route edge ngf \
--service=nginx-gateway-fabric-nginx \
--port=http \
-n nginx-gateway-fabricFor TLS passthrough, add --passthrough and target the appropriate Service port.
Verify that deployments and services are running, and confirm the GatewayClass:
oc get pods -n nginx-gateway-fabric
oc get svc -n nginx-gateway-fabric
oc get gatewayclassIf troubleshooting is required, review logs
Controller logs
oc logs deploy/ngf-nginx-gateway -n nginx-gateway-fabricData plane logs
oc logs deploy/ngf-nginx -n nginx-gateway-fabricCreate a Gateway and HTTPRoute to validate routing:
apiVersion: gateway.networking.k8s.io/v1
kind: Gateway
metadata:
name: http
namespace: nginx-gateway-fabric
spec:
gatewayClassName: nginx
listeners:
- name: http
port: 80
protocol: HTTP
hostname: example.com
allowedRoutes:
namespaces:
from: Same
---
apiVersion: gateway.networking.k8s.io/v1
kind: HTTPRoute
metadata:
name: echo
namespace: nginx-gateway-fabric
spec:
parentRefs:
- name: http
hostnames:
- example.com
rules:
- backendRefs:
- name: echo
port: 8080Ensure you have a Service and Deployment named echo that expose port 8080. If you are using a LoadBalancer Service, send a request to the load balancer IP address. Otherwise, use an OpenShift Route as configured.