Air GappedBare MetalInstallationRafay ControllerSelf HostedVM
Air-Gapped Controller Installation Guide
This guide provides detailed instructions for installing the Rafay Controller in air-gapped environments. Watch the video below for the high level installation steps.
The image below describes the various software components that are automatically installed and configured by Rafay's installer for the air gapped controller. The components span a few layers
Rafay Controller Application Layer
Observability Layer
Software Infrastructure Layer
Kubernetes Cluster Layer
Note
The provisioning and lifecycle management of the underlying VMs or Servers is the responsibility of the operator.
Rafay controller supports SSL offload at load balancer level using ACM/certificates. This would need two load balancers, one for UI FQDNs which requires SSL offload and another for backed FQDNs which requires SSL passthrough.
To enable external SSL offloading, the below override-config has to be enabled in config.yaml.
override-config.global.external_lb: true
1.5. DNS Settings for Using External SSL Offload (Optional)¶
For extended security, all Rafay backend endpoints use mTLS and do not support SSL offloading, except for the frontend UI endpoints.
Frontend FQDNs (Point to Classic Load Balancer for SSL Offloading)¶
Download the air-gapped setup package using the URL provided by the support team.
wget<URL_of_airgap_installation_package>
Info
The air-gapped package is around 30 GB and may take ~15 minutes to download with wget.
For faster downloads, use aria2c, which supports parallel connections:
This can significantly reduce download time by using up to 16 connections.
Validate the package checksum using md5sum to ensure the integrity of the downloaded file. The checksum value will be included in the documentation or shared by the support team for comparison.
spec:deployment:ha:true# set to true for HA controllerrepo:archive-directory:/path/to/tar/locationunarchive-path:/tmp# where to untarapp-config:generate-self-signed-certs:true# if using self-signed certificatespartner:star-domain:"*.example.com"
radm is a Go-based CLI tool used to manage the full lifecycle of a Rafay air-gapped controller. It handles tasks such as installing infrastructure add-ons, Kubernetes cluster creation, software provisioning, and ongoing maintenance of the controller like config updates, upgrades etc of the controller.Using simple commands, radm takes care of all the heavy lifting internally, making complex operations seamless.
2.4. Common Setup Steps (Applicable to Both Single Node and HA Setup)¶
Info
After each radm command is successfully executed, the CLI will print clear instructions to the console indicating the next steps in the installation process. This output is self-sufficient and acts as a guide, helping you proceed confidently without needing to refer back to the documentation for every step.
In this step, all the necessary dependencies for Rafay applications are installed. These dependencies enable various core services and functionalities across the platform. This includes essential infrastructure components such as:
cert-manager, Metric Server, Kafka, Postgres Operator, Elasticsearch, Istio, HAProxy, ClickHouse, MinIO, and other supporting add-ons required by Rafay services.
Note
This step will take approximately 15 to 16 minutes to complete, as multiple components are being deployed and initialized.
sudoradmdependency--configconfig.yaml
Install Rafay application:
Once the dependencies are initialized, proceed to install the Rafay platform services.
sudoradmapplication--configconfig.yaml
Installation Time
Allow 20 minutes for all pods to become ready. You can monitor pod status in the rafay-core namespace:
You can create the first organization in one of two ways:
Click "Sign Up" on the main console (https://console.<your-domain>)
Or use the Operations Console at https://ops-console.<your-domain> using the super-user credentials set in config.yaml to create the organization and user.
When creating the organization, provide the following details:
Organization Name
Username / Email
Password
After creating the organization and user, log in using the newly created credentials.
If you plan to create or manage downstream clusters (EKS, MKS, GKE & Import) from this controller, don’t forget to run the below Cluster Dependencies Step.
Upload cluster images and manifests to the built-in Nexus registry using the radm command below. This will push the required images, packs, and manifests to the built-in Nexus registry.These images and manifests will be used when creating or managing clusters with this air-gapped controller.
Rafay Controller supports multiple interfaces, configurable via config.yaml. By default, the primary interface is used for all Kubernetes and Rafay app connections
Configure network interface in config.yaml:
spec:networking:interface:ens3
For complete interface isolation, add routing rules:
Rafay Controller supports integrated cost visibility. For self-hosted setups, an external InfluxDB is required. Use the provided steps to deploy it on a single-node instance (min: 16 CPU, 32GB RAM, 200GB disk) and connect it