IMPORTANT NOTE: This site is not official Red Hat documentation and is provided for informational purposes only. These guides may be experimental, proof of concept, or early adoption. Officially supported documentation is available at and

This is a POC of ROSA with a AWS WAF service

Last Editor: Dustin Scott
Published Date: 17 June 2021
Modified Date: 25 May 2023

This is a POC of ROSA with a AWS WAF service

Non working (yet) instructions for using STS to manage the creds for ALB

See for a similar request

Here ’s a good overview of AWS LB types and what they support

Problem Statement

  1. Customer requires WAF (Web Application Firewall) in front of their workloads running on OpenShift (ROSA)

  2. Customer does not want WAF running on OpenShift to ensure that OCP resources do not experience Denial of Service through handling the WAF

Proposed Solution

Loosely based off EKS instructions here -

  1. Deploy secondary Ingress solution (+TLS +DNS) that uses an AWS ALB

  2. Configure TLS + DNS for that Ingress

    1. Lets Encrypt + WildCard DNS


AWS Load Balancer Controller

AWS Load Balancer controller manages the following AWS resources

Application Load Balancers to satisfy Kubernetes ingress objects Network Load Balancers in IP mode to satisfy Kubernetes service objects of type LoadBalancer with NLB IP mode annotation

Configure STS

  1. Make sure your cluster has the pod identity webhook

    kubectl get pod-identity-webhook
  2. Create AWS Policy and Service Account

    POLICY_ARN=$(aws iam create-policy --policy-name "AWSLoadBalancerControllerIAMPolicy" --policy-document file://iam-policy.json --query Policy.Arn --output text)
    echo $POLICY_ARN
  3. Create service account

    Note I had issues with the policy, and for now just gave this user admin creds. Need to revisit and figure out.

    SA_ARN=$(aws iam create-user --user-name aws-lb-controller --permissions-boundary=$POLICY_ARN --query User.Arn --output text)
  4. Create access key

    ACCESS_KEY=$(aws iam create-access-key --user-name aws-lb-controller)
  5. Attach policy to user

  6. Paste the AccessKeyId and SecretAccessKey into values.yaml

  7. tag your public subnet with ``

  8. Create a namespace for the controller

    kubectl create ns aws-load-balancer-controller
  1. Apply CRDs

    kubectl apply -k ""
  2. Add the helm repo and install the controller (install helm3 if not already)

    helm repo add eks
    helm install -n aws-load-balancer-controller \
      aws-load-balancer-controller eks/aws-load-balancer-controller \
      --values=./helm/values.yaml --create-namespace

Deploy Sample Application

oc new-project demo
oc new-app
kubectl -n demo patch service django-ex -p '{"spec":{"type":"NodePort"}}'
kubectl apply -f ingress.yaml