Skip to content

Commit e664d1b

Browse files
erabil-mdbjwilliams-mongo
authored andcommitted
(DOCSP-32525) Fixes types and adds refs to cert-manager doc. (#1428)
1 parent 3576450 commit e664d1b

File tree

4 files changed

+19
-8
lines changed

4 files changed

+19
-8
lines changed

source/includes/steps-configure-cert-manager-integration.yaml

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -71,12 +71,14 @@ content: |
7171
7272
Create a ConfigMap containing your |certauth|. It must have two
7373
fields, ``ca-pem`` and ``mms-ca.crt``, both pointing to your
74+
|certauth| certificate. Replace ``<CA-certificate>`` with the path to your
7475
|certauth| certificate.
7576
77+
7678
.. code-block:: sh
7779
78-
kubectl create cm ca-issuer --from-literal=ca-pem=<CA-certificate> \
79-
--from-literal=mms-ca.crt=<CA-certificate>
80+
kubectl create cm ca-issuer --from-file=ca-pem=<CA-certificate> \
81+
--from-file=mms-ca.crt=<CA-certificate>
8082
8183
---
8284

@@ -114,7 +116,7 @@ content: |
114116
issuerRef:
115117
name: ca-issuer
116118
renewBefore: 120h0m0s
117-
secretName: mdb-my-replica-set-agent-certs
119+
secretName: mdb-my-replica-set-cert
118120
usages:
119121
- server auth
120122
- client auth
@@ -142,7 +144,11 @@ content: |
142144
issuerRef:
143145
name: ca-issuer
144146
renewBefore: 120h0m0s
145-
secretName: agent-certs
147+
secretName: mdb-my-replica-set-agent-certs
148+
usages:
149+
- digital signature
150+
- key encipherment
151+
- client auth
146152
subject:
147153
countries:
148154
- US
@@ -154,10 +160,6 @@ content: |
154160
- cluster.local-agent
155161
provinces:
156162
- NY
157-
usages:
158-
- digital signature
159-
- key encipherment
160-
- client auth
161163
162164
#. Create the MongoDB resource:
163165

source/includes/use-cert-manager.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
.. note::
2+
3+
To automate certificate renewal for |onprem| deployments, consider setting up the :ref:`cert-manager integration <cert-manager-integration>`.

source/tutorial/create-x509-client-certs.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ to connect to your X.509-enabled MongoDB deployment.
2525

2626
.. include:: /includes/facts/fact-if-use-vault.rst
2727

28+
.. include:: /includes/use-cert-manager.rst
29+
2830
Prerequisites
2931
-------------
3032

source/tutorial/secure-x509-auth.txt

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ Renew X.509 Certificates for a Replica Set
5252
If you have already created certificates, we recommend that you renew
5353
them periodically using the following procedure.
5454

55+
.. include:: /includes/use-cert-manager.rst
56+
5557
.. include:: /includes/steps/deploy-k8s-rs-x509-custom-renew.rst
5658

5759

@@ -75,5 +77,7 @@ Renew X.509 Certificates for a Sharded Cluster
7577
If you have already created certificates, we recommend that you renew
7678
them periodically using the following procedure.
7779

80+
.. include:: /includes/use-cert-manager.rst
81+
7882
.. include:: /includes/steps/deploy-k8s-sc-x509-custom-renew.rst
7983

0 commit comments

Comments
 (0)