1
- title : " Configure a cert-manager |certauth| issuer"
1
+ stepnum : 1
2
+ title : " Create a |certauth| secret."
2
3
level : 4
3
- ref : configure -cert-manager-issuer
4
+ ref : create -cert-auth-secret
4
5
content : |
5
6
6
7
.. note::
@@ -9,20 +10,37 @@ content: |
9
10
|certauth| along with the corresponding ``tls.key`` private key
10
11
and ``tls.crt`` signed certificate.
11
12
12
- 1. Create a secret to store your |certauth| data:
13
+ Create a secret to store your |certauth| data:
13
14
14
- .. code-block:: yaml
15
+ .. code-block:: yaml
15
16
16
- apiVersion: v1
17
- kind: Secret
18
- metadata:
19
- name: ca-key-pair
20
- namespace: <namespace>
21
- data:
22
- tls.crt: <your-CA-certificate>
23
- tls.key: <your-CA-private-key>
17
+ apiVersion: v1
18
+ kind: Secret
19
+ metadata:
20
+ name: ca-key-pair
21
+ namespace: <namespace>
22
+ data:
23
+ tls.crt: <your-CA-certificate>
24
+ tls.key: <your-CA-private-key>
25
+
26
+ ---
27
+
28
+ stepnum : 2
29
+ ref : validate-tls-cert-for-cert-manager
30
+ level : 4
31
+ source :
32
+ file : steps-deploy-k8s-opsmgr-https.yaml
33
+ ref : validate-tls-cert
34
+
35
+ ---
36
+
37
+ stepnum : 3
38
+ title : " Configure a cert-manager |certauth| issuer"
39
+ level : 4
40
+ ref : configure-cert-manager-issuer
41
+ content : |
24
42
25
- # . Create a |certauth| issuer that references this secret:
43
+ a . Create a |certauth| issuer that references your |certauth| secret:
26
44
27
45
.. code-block:: yaml
28
46
@@ -45,6 +63,7 @@ content: |
45
63
46
64
---
47
65
66
+ stepnum : 4
48
67
title : " Create a |certauth| ConfigMap"
49
68
level : 4
50
69
ref : create-ca-config-map
@@ -56,11 +75,12 @@ content: |
56
75
57
76
.. code-block:: sh
58
77
59
- kubectl create cm issuer-ca --from-literal=ca-pem=<CA-certificate> \
78
+ kubectl create cm ca-issuer --from-literal=ca-pem=<CA-certificate> \
60
79
--from-literal=mms-ca.crt=<CA-certificate>
61
80
62
81
---
63
82
83
+ stepnum : 5
64
84
title : " Create certificates for your MongoDB resources"
65
85
level : 4
66
86
ref : create-cert-manager-certificate
@@ -70,9 +90,11 @@ content: |
70
90
must create certificates for both the resource itself and the MongoDB
71
91
agent.
72
92
73
- 1 . Create the MongoDB resource certificate. The following example
93
+ a . Create the MongoDB resource certificate. The following example
74
94
assumes a replica set named `my-replica-set` with three members:
75
95
96
+ .. include:: /includes/fact-issuerRef.rst
97
+
76
98
.. code-block:: yaml
77
99
78
100
apiVersion: cert-manager.io/v1
@@ -92,17 +114,19 @@ content: |
92
114
issuerRef:
93
115
name: ca-issuer
94
116
renewBefore: 120h0m0s
95
- secretName: mdb-my-replica-set-cert
117
+ secretName: mdb-my-replica-set-agent-certs
96
118
usages:
97
119
- server auth
98
120
- client auth
99
121
100
- For sharded clusters, you must create one certificate for each
101
- statefulset. To learn more about sharded cluster configuration, see
102
- :ref:`deploy-sharded-cluster`.
122
+ For sharded clusters, you must create one certificate for each
123
+ |k8s- statefulset| . To learn more about sharded cluster
124
+ configuration, see :ref:`deploy-sharded-cluster`.
103
125
104
126
#. Create the MongoDB agent certificate:
105
127
128
+ .. include:: /includes/fact-issuerRef.rst
129
+
106
130
.. code-block:: yaml
107
131
108
132
apiVersion: cert-manager.io/v1
@@ -137,6 +161,11 @@ content: |
137
161
138
162
#. Create the MongoDB resource:
139
163
164
+ .. note::
165
+
166
+ If you leave the :opsmgrkube:`spec.security.tls.ca`
167
+ parameter unspecified, it defaults to ``{replica-set}-ca``.
168
+
140
169
.. code-block:: yaml
141
170
142
171
apiVersion: mongodb.com/v1
@@ -161,12 +190,13 @@ content: |
161
190
enabled: true
162
191
modes:
163
192
- X509
164
- tls:
165
- ca: issuer-ca
166
- enabled: true
193
+ tls:
194
+ ca: ca-issuer
195
+ enabled: true
167
196
168
197
---
169
198
199
+ stepnum : 6
170
200
title : " Create certificates for |onprem| and AppDB with TLS"
171
201
level : 4
172
202
ref : create-om-appdb-tls-certs
@@ -175,7 +205,9 @@ content: |
175
205
To secure an |onprem| resource, you must first create certificates
176
206
for |onprem| and AppDB, then create the |onprem| resource.
177
207
178
- 1. Create the Ops Manager certificate:
208
+ a. Create the Ops Manager certificate:
209
+
210
+ .. include:: /includes/fact-issuerRef.rst
179
211
180
212
.. code-block:: yaml
181
213
@@ -191,13 +223,15 @@ content: |
191
223
issuerRef:
192
224
name: ca-issuer
193
225
renewBefore: 120h0m0s
194
- secretName: mdb-op -with-https-cert
226
+ secretName: mdb-om -with-https-cert
195
227
usages:
196
228
- server auth
197
229
- client auth
198
230
199
231
#. Create the AppDB certificate:
200
232
233
+ .. include:: /includes/fact-issuerRef.rst
234
+
201
235
.. code-block:: yaml
202
236
203
237
apiVersion: cert-manager.io/v1
@@ -238,10 +272,10 @@ content: |
238
272
security:
239
273
certsSecretPrefix: appdb
240
274
tls:
241
- ca: issuer-ca
242
- version: 4.4.0-ent
275
+ ca: ca-issuer
276
+ version: 6.0.0
243
277
replicas: 1
244
278
security:
245
279
certsSecretPrefix: mdb
246
280
tls:
247
- ca: issuer-ca
281
+ ca: ca-issuer
0 commit comments