Какие виды сертификатов поддерживаются? | What types of certificates are supported? |
На данный момент модуль устанавливает следующие
| The module installs the following ClusterIssuers:
|
Если требуется поддержка других типов сертификатов, вы можете добавить их самостоятельно. | If you need support for other types of certificates, you can add them yourself. |
Как добавить дополнительный
| How to add an additional
|
В каких случаях требуется дополнительный
| When is an additional
|
В стандартной поставке присутствуют | The standard delivery set includes |
Чтобы издать сертификаты на доменное имя через Let’s Encrypt, сервис требует осуществить подтверждение владения доменом.
| To issue certificates for a domain name via Let’s Encrypt, the service requires that you verify domain ownership.
The
|
Метод | The |
Поставляемые
| The |
Таким образом, дополнительный
|
|
Как добавить дополнительный
| Added automatically when filling in the module settings associated with the cloud provider.
|
Для подтверждения владения доменом через Let’s Encrypt с помощью метода | In this way, an additional
|
У | How to add an additional
|
Модуль автоматически создает | To verify domain ownership via Let’s Encrypt using the |
Пример использования AWS Route53 доступен в разделе Как защитить учетные данные |
|
Использование сторонних DNS-провайдеров реализуется через метод | The module automatically creates |
В качестве примера рассмотрим использование сервиса | An example of using AWS Route53 is available in the section How to protect |
| Using third-party DNS providers is implemented via the |
| When cert-manager makes an |
yaml apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: yc-clusterissuer namespace: default spec: acme: Вы должны заменить этот адрес электронной почты на свой собственный. Let’s Encrypt будет использовать его, чтобы связаться с вами по поводу истекающих сертификатов и вопросов, связанных с вашей учетной записью. email: your@email.com server: https://acme-staging-v02.api.letsencrypt.org/directory privateKeySecretRef: Ресурс секретов, который будет использоваться для хранения закрытого ключа аккаунта. name: secret-ref solvers:
| As an example, let’s consider using the |
Как добавить дополнительный
|
|
Для выпуска сертификатов с помощью HashiСorp Vault, можете использовать инструкцию. |
|
После конфигурации PKI и включения авторизации в Kubernetes, нужно:
| yaml apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: yc-clusterissuer namespace: default spec: acme: You must replace this email address with your own. Let’s Encrypt will use this to contact you about expiring certificates, and issues related to your account. email: your@email.com server: https://acme-staging-v02.api.letsencrypt.org/directory privateKeySecretRef: Secret resource that will be used to store the account’s private key. name: secret-ref solvers:
|
shell kubectl create serviceaccount issuer ISSUER_SECRET_REF=$(kubectl get serviceaccount issuer -o json | jq -r “.secrets[].name”) | How to add an additional
|
| You can use this manual for configuring certificate issuance using Vault. |
shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: Issuer metadata: name: vault-issuer namespace: default spec: vault: Если Vault разворачивался по вышеуказанной инструкции, в этом месте в инструкции опечатка. server: http://vault.default.svc.cluster.local:8200 Указывается на этапе конфигурации PKI. path: pki/sign/example-dot-com auth: kubernetes: mountPath: /v1/auth/kubernetes role: issuer secretRef: name: $ISSUER_SECRET_REF key: token EOF | After configuring PKI and enabling Kubernetes authorization, you have to:
|
| shell kubectl create serviceaccount issuer ISSUER_SECRET_REF=$(kubectl get serviceaccount issuer -o json | jq -r “.secrets[].name”) |
shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: example-com namespace: default spec: secretName: example-com-tls issuerRef: name: vault-issuer Домены указываются на этапе конфигурации PKI в Vault. commonName: www.example.com dnsNames:
|
|
Как добавить
| shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: Issuer metadata: name: vault-issuer namespace: default spec: vault: HashiCorp instruction has mistype here server: http://vault.default.svc.cluster.local:8200 path: pki/sign/example-dot-com # configure in pki setup step auth: kubernetes: mountPath: /v1/auth/kubernetes role: issuer secretRef: name: $ISSUER_SECRET_REF key: token EOF |
Для использования собственного или промежуточного CA: |
|
| shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: example-com namespace: default spec: secretName: example-com-tls issuerRef: name: vault-issuer domains are set on PKI setup commonName: www.example.com dnsNames:
|
shell openssl genrsa -out rootCAKey.pem 2048 openssl req -x509 -sha256 -new -nodes -key rootCAKey.pem -days 3650 -out rootCACert.pem | How to add
|
| Follow the steps below to use a custom or interim CA: |
shell kubectl create secret tls internal-ca-key-pair -n d8-cert-manager –key=”rootCAKey.pem” –cert=”rootCACert.pem” |
|
Пример создания секрета из YAML-файла (содержимое файлов сертификатов должно быть закодировано в Base64): | shell openssl genrsa -out rootCAKey.pem 2048 openssl req -x509 -sha256 -new -nodes -key rootCAKey.pem -days 3650 -out rootCACert.pem |
yaml
apiVersion: v1
data:
tls.crt: <результат команды |
|
Имя секрета может быть любым. | An example of creating a secret with kubectl: |
| shell kubectl create secret tls internal-ca-key-pair -n d8-cert-manager –key=”rootCAKey.pem” –cert=”rootCACert.pem” |
yaml apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: inter-ca spec: ca: secretName: internal-ca-key-pair # Имя созданного секрета. | An example of creating a secret from a YAML file (the contents of the certificate files must be Base64-encoded): |
Имя | yaml
apiVersion: v1
data:
tls.crt: <OUTPUT OF |
Теперь можно использовать созданный | You can use any name you like for the secret. |
Например, чтобы использовать |
|
yaml
spec:
settings:
modules:
https:
certManager:
clusterIssuerName: inter-ca
mode: CertManager
publicDomainTemplate: ‘%s. | yaml apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: inter-ca spec: ca: secretName: internal-ca-key-pair # Name of the secret you created earlier. |
Как защитить учетные данные
| You can use any name as your |
Если вы не хотите хранить учетные данные конфигурации Deckhouse (например, по соображениям безопасности), можете создать
свой собственный | You can now use the created |
Пример создания собственного
| For example, to issue certificates for all Deckhouse components, specify the |
shell kubectl apply -f - «EOF apiVersion: v1 kind: Secret type: Opaque metadata: name: route53 namespace: default data: secret-access-key: {{ “MY-AWS-ACCESS-KEY-TOKEN” | b64enc | quote }} EOF | yaml
spec:
settings:
modules:
https:
certManager:
clusterIssuerName: inter-ca
mode: CertManager
publicDomainTemplate: ‘%s. |
| How to secure
|
shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: route53 namespace: default spec: acme: server: https://acme-v02.api.letsencrypt.org/directory privateKeySecretRef: name: route53-tls-key solvers:
| If you don’t want to store credentials in the Deckhouse configuration (security reasons, for example), feel free to create
your own ClusterIssuer / Issuer.
For example, you can create your own
|
| shell kubectl apply -f - «EOF apiVersion: v1 kind: Secret type: Opaque metadata: name: route53 namespace: default data: secret-access-key: {{ “MY-AWS-ACCESS-KEY-TOKEN” | b64enc | quote }} EOF |
shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: example-com namespace: default spec: secretName: example-com-tls issuerRef: name: route53 commonName: www.example.com dnsNames:
|
|
Работает ли старая аннотация TLS-acme? | shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: ClusterIssuer metadata: name: route53 namespace: default spec: acme: server: https://acme-v02.api.letsencrypt.org/directory privateKeySecretRef: name: route53-tls-key solvers:
|
Да, работает. Специальный компонент |
|
| shell kubectl apply -f - «EOF apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: example-com namespace: default spec: secretName: example-com-tls issuerRef: name: route53 commonName: www.example.com dnsNames:
|
yaml apiVersion: networking.k8s.io/v1 kind: Ingress metadata: annotations: kubernetes.io/tls-acme: “true” # Аннотация. name: example-com namespace: default spec: ingressClassName: nginx rules:
| Does the legacy tls-acme annotation work? |
Как посмотреть состояние сертификата? | Yes, it works! The dedicated component (
|
shell kubectl -n default describe certificate example-com … Status: Acme: Authorizations: Account: https://acme-v01.api.letsencrypt.org/acme/reg/22442061 Domain: example.com Uri: https://acme-v01.api.letsencrypt.org/acme/challenge/qJA9MGCZnUnVjAgxhoxONvDnKAsPatRILJ4n0lJ7MMY/4062050823 Account: https://acme-v01.api.letsencrypt.org/acme/reg/22442061 Domain: admin.example.com Uri: https://acme-v01.api.letsencrypt.org/acme/challenge/pW2tFKLBDTll2Gx8UBqmEl846x5W-YpBs8a4HqstJK8/4062050808 Account: https://acme-v01.api.letsencrypt.org/acme/reg/22442061 Domain: www.example.com Uri: https://acme-v01.api.letsencrypt.org/acme/challenge/LaZJMM9_OKcTYbEThjT3oLtwgpkNfbHVdl8Dz-yypx8/4062050792 Conditions: Last Transition Time: 2018-04-02T18:01:04Z Message: Certificate issued successfully Reason: CertIssueSuccess Status: True Type: Ready Events: Type Reason Age From Message —- —— —- —- ——- Normal PrepareCertificate 1m cert-manager-controller Preparing certificate with issuer Normal PresentChallenge 1m cert-manager-controller Presenting http-01 challenge for domain example.com Normal PresentChallenge 1m cert-manager-controller Presenting http-01 challenge for domain www.example.com Normal PresentChallenge 1m cert-manager-controller Presenting http-01 challenge for domain admin.example.com Normal SelfCheck 1m cert-manager-controller Performing self-check for domain admin.example.com Normal SelfCheck 1m cert-manager-controller Performing self-check for domain example.com Normal SelfCheck 1m cert-manager-controller Performing self-check for domain www.example.com Normal ObtainAuthorization 55s cert-manager-controller Obtained authorization for domain example.com Normal ObtainAuthorization 54s cert-manager-controller Obtained authorization for domain admin.example.com Normal ObtainAuthorization 53s cert-manager-controller Obtained authorization for domain www.example.com | yaml apiVersion: networking.k8s.io/v1 kind: Ingress metadata: annotations: kubernetes.io/tls-acme: “true” # The annotation. name: example-com namespace: default spec: ingressClassName: nginx rules:
|
Как получить список сертификатов? | How do I check the certificate status? |
shell kubectl get certificate –all-namespaces | shell |
NAMESPACE NAME AGE default example-com 13m | kubectl -n default describe certificate example-com … Status: Acme: Authorizations: Account: https://acme-v01.api.letsencrypt.org/acme/reg/22442061 Domain: example.com Uri: https://acme-v01.api.letsencrypt.org/acme/challenge/qJA9MGCZnUnVjAgxhoxONvDnKAsPatRILJ4n0lJ7MMY/4062050823 Account: https://acme-v01.api.letsencrypt.org/acme/reg/22442061 Domain: admin.example.com Uri: https://acme-v01.api.letsencrypt.org/acme/challenge/pW2tFKLBDTll2Gx8UBqmEl846x5W-YpBs8a4HqstJK8/4062050808 Account: https://acme-v01.api.letsencrypt.org/acme/reg/22442061 Domain: www.example.com Uri: https://acme-v01.api.letsencrypt.org/acme/challenge/LaZJMM9_OKcTYbEThjT3oLtwgpkNfbHVdl8Dz-yypx8/4062050792 Conditions: Last Transition Time: 2018-04-02T18:01:04Z Message: Certificate issued successfully Reason: CertIssueSuccess Status: True Type: Ready Events: Type Reason Age From Message —- —— —- —- ——- Normal PrepareCertificate 1m cert-manager-controller Preparing certificate with issuer Normal PresentChallenge 1m cert-manager-controller Presenting http-01 challenge for domain example.com Normal PresentChallenge 1m cert-manager-controller Presenting http-01 challenge for domain www.example.com Normal PresentChallenge 1m cert-manager-controller Presenting http-01 challenge for domain admin.example.com Normal SelfCheck 1m cert-manager-controller Performing self-check for domain admin.example.com Normal SelfCheck 1m cert-manager-controller Performing self-check for domain example.com Normal SelfCheck 1m cert-manager-controller Performing self-check for domain www.example.com Normal ObtainAuthorization 55s cert-manager-controller Obtained authorization for domain example.com Normal ObtainAuthorization 54s cert-manager-controller Obtained authorization for domain admin.example.com Normal ObtainAuthorization 53s cert-manager-controller Obtained authorization for domain www.example.com |
Что делать, если появляется ошибка: CAA record does not match issuer? | How do I get a list of certificates? |
Если | shell |
text CAA record does not match issuer | kubectl get certificate –all-namespaces NAMESPACE NAME AGE default example-com 13m |
то необходимо проверить | The “CAA record does not match issuer” error |
Suppose | |
text CAA record does not match issuer | |
In this case, you have to check the |