Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 9. cert-manager Operator for Red Hat OpenShift
9.1. cert-manager Operator for Red Hat OpenShift overview Link kopierenLink in die Zwischenablage kopiert!
The cert-manager Operator for Red Hat OpenShift is a cluster-wide service that provides application certificate lifecycle management. The cert-manager Operator for Red Hat OpenShift allows you to integrate with external certificate authorities and provides certificate provisioning, renewal, and retirement.
9.1.1. About the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
The cert-manager project introduces certificate authorities and certificates as resource types in the Kubernetes API, which makes it possible to provide certificates on demand to developers working within your cluster. The cert-manager Operator for Red Hat OpenShift provides a supported way to integrate cert-manager into your OpenShift Container Platform cluster.
The cert-manager Operator for Red Hat OpenShift provides the following features:
- Support for integrating with external certificate authorities
 - Tools to manage certificates
 - Ability for developers to self-serve certificates
 - Automatic certificate renewal
 
Do not attempt to use both cert-manager Operator for Red Hat OpenShift for OpenShift Container Platform and the community cert-manager Operator at the same time in your cluster.
Also, you should not install cert-manager Operator for Red Hat OpenShift for OpenShift Container Platform in multiple namespaces within a single OpenShift cluster.
9.1.2. Supported issuer types Link kopierenLink in die Zwischenablage kopiert!
The cert-manager Operator for Red Hat OpenShift supports the following issuer types:
9.1.3. Certificate request methods Link kopierenLink in die Zwischenablage kopiert!
There are two ways to request a certificate using the cert-manager Operator for Red Hat OpenShift:
- Using the 
cert-manager.io/CertificateRequestobject - 
								With this method a service developer creates a 
CertificateRequestobject with a validissuerRefpointing to a configured issuer (configured by a service infrastructure administrator). A service infrastructure administrator then accepts or denies the certificate request. Only accepted certificate requests create a corresponding certificate. - Using the 
cert-manager.io/Certificateobject - 
								With this method, a service developer creates a 
Certificateobject with a validissuerRefand obtains a certificate from a secret that they pointed to theCertificateobject. 
9.2. cert-manager Operator for Red Hat OpenShift release notes Link kopierenLink in die Zwischenablage kopiert!
The cert-manager Operator for Red Hat OpenShift is a cluster-wide service that provides application certificate lifecycle management.
These release notes track the development of cert-manager Operator for Red Hat OpenShift.
For more information, see About the cert-manager Operator for Red Hat OpenShift.
9.2.1. cert-manager Operator for Red Hat OpenShift 1.13.1 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2024-05-15
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.13.1:
					Version 1.13.1 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.13.6. For more information, see the cert-manager project release notes for v1.13.6.
				
9.2.1.1. CVEs Link kopierenLink in die Zwischenablage kopiert!
9.2.2. cert-manager Operator for Red Hat OpenShift 1.13.0 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2024-01-16
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.13.0:
					Version 1.13.0 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.13.3. For more information, see the cert-manager project release notes for v1.13.0.
				
9.2.2.1. New features and enhancements Link kopierenLink in die Zwischenablage kopiert!
- You can now manage certificates for API Server and Ingress Controller by using the cert-manager Operator for Red Hat OpenShift. For more information, see Configuring certificates with an issuer.
 - 
								With this release, the scope of the cert-manager Operator for Red Hat OpenShift, which was previously limited to the OpenShift Container Platform on AMD64 architecture, has now been expanded to include support for managing certificates on OpenShift Container Platform running on IBM Z (
s390x), IBM Power (ppc64le), and ARM64 architectures. - 
								With this release, you can use DNS over HTTPS (DoH) for performing the self-checks during the ACME DNS-01 challenge verification. The DNS self-check method can be controlled by using the command-line flags, 
--dns01-recursive-nameservers-onlyand--dns01-recursive-nameservers. For more information, see Customizing cert-manager by overriding arguments from the cert-manager Operator API. 
9.2.2.2. CVEs Link kopierenLink in die Zwischenablage kopiert!
9.2.3. Release notes for cert-manager Operator for Red Hat OpenShift 1.12.1 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-11-15
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.12.1:
					Version 1.12.1 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.12.5. For more information, see the cert-manager project release notes for v1.12.5.
				
9.2.3.1. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- Previously, in a multi-architecture environment, the cert-manager Operator pods were prone to failures because of the invalid node affinity configuration. With this fix, the cert-manager Operator pods run without any failures. (OCPBUGS-19446)
 
9.2.3.2. CVEs Link kopierenLink in die Zwischenablage kopiert!
9.2.4. Release notes for cert-manager Operator for Red Hat OpenShift 1.12.0 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-10-02
The following advisories are available for the cert-manager Operator for Red Hat OpenShift 1.12.0:
					Version 1.12.0 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.12.4. For more information, see the cert-manager project release notes for v1.12.4.
				
9.2.4.1. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- Previously, you could not configure the CPU and memory requests and limits for the cert-manager components such as cert-manager controller, CA injector, and Webhook. Now, you can configure the CPU and memory requests and limits for the cert-manager components by using the command-line interface (CLI). For more information, see Overriding CPU and memory limits for the cert-manager components. (OCPBUGS-13830)
 - 
								Previously, if you updated the 
ClusterIssuerobject, the cert-manager Operator for Red Hat OpenShift could not verify and update the change in the cluster issuer. Now, if you modify theClusterIssuerobject, the cert-manager Operator for Red Hat OpenShift verifies the ACME account registration and updates the change. (OCPBUGS-8210) - 
								Previously, the cert-manager Operator for Red Hat OpenShift did not support enabling the 
--enable-certificate-owner-refflag. Now, the cert-manager Operator for Red Hat OpenShift supports enabling the--enable-certificate-owner-refflag by adding thespec.controllerConfig.overrideArgsfield in theclusterobject. After enabling the--enable-certificate-owner-refflag, cert-manager can automatically delete the secret when theCertificateresource is removed from the cluster. For more information on enabling the--enable-certificate-owner-refflag and deleting the TLS secret automatically, see Deleting a TLS secret automatically upon Certificate removal (CM-98) - 
								Previously, the cert-manager Operator for Red Hat OpenShift could not pull the 
jetstack-cert-manager-container-v1.12.4-1image. The cert-manager controller, CA injector, and Webhook pods were stuck in theImagePullBackOffstate. Now, the cert-manager Operator for Red Hat OpenShift pulls thejetstack-cert-manager-container-v1.12.4-1image to run the cert-manager controller, CA injector, and Webhook pods successfully. (OCPBUGS-19986) 
9.2.5. Release notes for cert-manager Operator for Red Hat OpenShift 1.11.5 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-11-15
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.11.5:
					The golang version is updated to the version 1.20.10 to fix Common Vulnerabilities and Exposures (CVEs). Version 1.11.5 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.11.5. For more information, see the cert-manager project release notes for v1.11.5.
				
9.2.5.1. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- Previously, in a multi-architecture environment, the cert-manager Operator pods were prone to failures because of the invalid node affinity configuration. With this fix, the cert-manager Operator pods run without any failures. (OCPBUGS-19446)
 
9.2.5.2. CVEs Link kopierenLink in die Zwischenablage kopiert!
9.2.6. Release notes for cert-manager Operator for Red Hat OpenShift 1.11.4 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-07-26
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.11.4:
					The golang version is updated to the version 1.19.10 to fix Common Vulnerabilities and Exposures (CVEs). Version 1.11.4 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.11.4. For more information, see the cert-manager project release notes for v1.11.4.
				
9.2.6.1. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- Previously, the cert-manager Operator for Red Hat OpenShift did not allow you to install older versions of the cert-manager Operator for Red Hat OpenShift. Now, you can install older versions of the cert-manager Operator for Red Hat OpenShift using the web console or the command-line interface (CLI). For more information on how to use the web console to install older versions, see Installing the cert-manager Operator for Red Hat OpenShift. (OCPBUGS-16393)
 
9.2.7. Release notes for cert-manager Operator for Red Hat OpenShift 1.11.1 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-06-21
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.11.1:
					Version 1.11.1 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.11.1. For more information, see the cert-manager project release notes for v1.11.1.
				
9.2.7.1. New features and enhancements Link kopierenLink in die Zwischenablage kopiert!
This is the general availability (GA) release of the cert-manager Operator for Red Hat OpenShift.
9.2.7.1.1. Setting log levels for cert-manager and the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
- To troubleshoot issues with cert-manager and the cert-manager Operator for Red Hat OpenShift, you can now configure the log level verbosity by setting a log level for cert-manager and the cert-manager Operator for Red Hat OpenShift. For more information, see Configuring log levels for cert-manager and the cert-manager Operator for Red Hat OpenShift.
 
9.2.7.1.2. Authenticating the cert-manager Operator for Red Hat OpenShift with AWS Link kopierenLink in die Zwischenablage kopiert!
- You can now configure cloud credentials for the cert-manager Operator for Red Hat OpenShift on AWS clusters with Security Token Service (STS) and without STS. For more information, see Authenticating the cert-manager Operator for Red Hat OpenShift on AWS Security Token Service and Authenticating the cert-manager Operator for Red Hat OpenShift on AWS.
 
9.2.7.1.3. Authenticating the cert-manager Operator for Red Hat OpenShift with GCP Link kopierenLink in die Zwischenablage kopiert!
- You can now configure cloud credentials for the cert-manager Operator for Red Hat OpenShift on GCP clusters with Workload Identity and without Workload Identity. For more information, see Authenticating the cert-manager Operator for Red Hat OpenShift with GCP Workload Identity and Authenticating the cert-manager Operator for Red Hat OpenShift with GCP
 
9.2.7.2. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- 
								Previously, the 
cm-acme-http-solverpod did not use the latest published Red Hat imageregistry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9. With this release, thecm-acme-http-solverpod uses the latest published Red Hat imageregistry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9. (OCPBUGS-10821) - Previously, the cert-manager Operator for Red Hat OpenShift did not support changing labels for cert-manager pods such as controller, CA injector, and Webhook pods. With this release, you can add labels to cert-manager pods. (OCPBUGS-8466)
 - 
								Previously, you could not update the log verbosity level in the cert-manager Operator for Red Hat OpenShift. You can now update the log verbosity level by using an environmental variable 
OPERATOR_LOG_LEVELin its subscription resource. (OCPBUGS-9994) - Previously, when uninstalling the cert-manager Operator for Red Hat OpenShift, if you select the Delete all operand instances for this operator checkbox in the OpenShift Container Platform web console, the Operator was not uninstalled properly. The cert-manager Operator for Red Hat OpenShift is now properly uninstalled. (OCPBUGS-9960)
 - Previously, the cert-manager Operator for Red Hat OpenShift did not support using Google workload identity federation. The cert-manager Operator for Red Hat OpenShift now supports using Google workload identity federation. (OCPBUGS-9998)
 
9.2.7.3. Known issues Link kopierenLink in die Zwischenablage kopiert!
- 
								After installing the cert-manager Operator for Red Hat OpenShift, if you navigate to Operators 
Installed Operators and select Operator details in the OpenShift Container Platform web console, you cannot see the cert-manager resources that are created across all namespaces. As a workaround, you can navigate to Home API Explorer to see the cert-manager resources. (OCPBUGS-11647)  - 
								After uninstalling the cert-manager Operator for Red Hat OpenShift by using the web console, the cert-manager Operator for Red Hat OpenShift does not remove the cert-manager controller, CA injector, and Webhook pods automatically from the 
cert-managernamespace. As a workaround, you can manually delete the cert-manager controller, CA injector, and Webhook pod deployments present in thecert-managernamespace. (OCPBUGS-13679) 
9.2.8. Release notes for cert-manager Operator for Red Hat OpenShift 1.10.3 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-08-08
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.10.3:
					The version 1.10.3 of the cert-manager Operator for Red Hat OpenShift is based on the cert-manager upstream version v1.10.2. With this release, the version of the cert-manager Operator for Red Hat OpenShift is 1.10.3 but the cert-manager operand version is 1.10.2. For more information, see the cert-manager project release notes for v1.10.2.
				
9.2.8.1. CVEs Link kopierenLink in die Zwischenablage kopiert!
9.2.9. Release notes for cert-manager Operator for Red Hat OpenShift 1.10.2 Link kopierenLink in die Zwischenablage kopiert!
Issued: 2023-03-23
The following advisory is available for the cert-manager Operator for Red Hat OpenShift 1.10.2:
					Version 1.10.2 of the cert-manager Operator for Red Hat OpenShift is based on the upstream cert-manager version v1.10.2. For more information, see the cert-manager project release notes for v1.10.2.
				
If you used the Technology Preview version of the cert-manager Operator for Red Hat OpenShift, you must uninstall it and remove all related resources for the Technology Preview version before installing this version of the cert-manager Operator for Red Hat OpenShift.
For more information, see Uninstalling the cert-manager Operator for Red Hat OpenShift.
9.2.9.1. New features and enhancements Link kopierenLink in die Zwischenablage kopiert!
This is the general availability (GA) release of the cert-manager Operator for Red Hat OpenShift.
The following issuer types are supported:
- Automated Certificate Management Environment (ACME)
 - Certificate authority (CA)
 - Self-signed
 
The following ACME challenge types are supported:
- DNS-01
 - HTTP-01
 
The following DNS-01 providers for ACME issuers are supported:
- Amazon Route 53
 - Azure DNS
 - Google Cloud DNS
 
- The cert-manager Operator for Red Hat OpenShift now supports injecting custom CA certificates and propagating cluster-wide egress proxy environment variables.
 - You can customize the cert-manager Operator for Red Hat OpenShift API fields by overriding environment variables and arguments. For more information, see Customizing cert-manager Operator API fields
 - You can enable monitoring and metrics collection for the cert-manager Operator for Red Hat OpenShift by using a service monitor to perform the custom metrics scraping. After you have enabled monitoring for the cert-manager Operator for Red Hat OpenShift, you can query its metrics by using the OpenShift Container Platform web console. For more information, see Enabling monitoring for the cert-manager Operator for Red Hat OpenShift
 
9.2.9.2. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
Previously, the
unsupportedConfigOverridesfield replaced user-provided arguments instead of appending them. Now, theunsupportedConfigOverridesfield properly appends user-provided arguments. (CM-23)WarningUsing the
unsupportedConfigOverridessection to modify the configuration of an Operator is unsupported and might block cluster upgrades.- Previously, the cert-manager Operator for Red Hat OpenShift was installed as a cluster Operator. With this release, the cert-manager Operator for Red Hat OpenShift is now properly installed as an OLM Operator. (CM-35)
 
9.2.9.3. Known issues Link kopierenLink in die Zwischenablage kopiert!
- 
								Using 
Routeobjects is not fully supported. Currently, to use cert-manager Operator for Red Hat OpenShift withRoutes, users must createIngressobjects, which are translated toRouteobjects by the Ingress-to-Route Controller. (CM-16) - The cert-manager Operator for Red Hat OpenShift does not support using Azure Active Directory (Azure AD) pod identities to assign a managed identity to a pod. As a workaround, you can use a service principal to assign a managed identity. (OCPBUGS-8665)
 - The cert-manager Operator for Red Hat OpenShift does not support using Google workload identity federation. (OCPBUGS-9998)
 - When uninstalling the cert-manager Operator for Red Hat OpenShift, if you select the Delete all operand instances for this operator checkbox in the OpenShift Container Platform web console, the Operator is not uninstalled properly. As a workaround, do not select this checkbox when uninstalling the cert-manager Operator for Red Hat OpenShift. (OCPBUGS-9960)
 
9.3. Installing the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
The cert-manager Operator for Red Hat OpenShift is not installed in OpenShift Container Platform by default. You can install the cert-manager Operator for Red Hat OpenShift by using the web console.
9.3.1. Installing the cert-manager Operator for Red Hat OpenShift using the web console Link kopierenLink in die Zwischenablage kopiert!
You can use the web console to install the cert-manager Operator for Red Hat OpenShift.
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have access to the OpenShift Container Platform web console.
 
Procedure
- Log in to the OpenShift Container Platform web console.
 - 
							Navigate to Operators 
OperatorHub.  - Enter cert-manager Operator for Red Hat OpenShift into the filter box.
 Select the cert-manager Operator for Red Hat OpenShift and click Install.
NoteFrom the cert-manager Operator for Red Hat OpenShift
1.12.0and later, the z-stream versions of the upstream cert-manager operands such as cert-manager controller, CA injector, Webhook, and cert-manager Operator for Red Hat OpenShift are decoupled. For example, for the cert-manager Operator for Red Hat OpenShift1.12.0, the cert-manager operand version isv1.12.4.On the Install Operator page:
- Update the Update channel, if necessary. The channel defaults to stable-v1, which installs the latest stable release of the cert-manager Operator for Red Hat OpenShift.
 Choose the Installed Namespace for the Operator. The default Operator namespace is
cert-manager-operator.If the
cert-manager-operatornamespace does not exist, it is created for you.Select an Update approval strategy.
- The Automatic strategy allows Operator Lifecycle Manager (OLM) to automatically update the Operator when a new version is available.
 - The Manual strategy requires a user with appropriate credentials to approve the Operator update.
 
- Click Install.
 
Verification
- 
							Navigate to Operators 
Installed Operators.  - 
							Verify that cert-manager Operator for Red Hat OpenShift is listed with a Status of Succeeded in the 
cert-manager-operatornamespace. Verify that cert-manager pods are up and running by entering the following command:
oc get pods -n cert-manager
$ oc get pods -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 3m39s cert-manager-cainjector-56cc5f9868-7g9z7 1/1 Running 0 4m5s cert-manager-webhook-d4f79d7f7-9dg9w 1/1 Running 0 4m9s
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 3m39s cert-manager-cainjector-56cc5f9868-7g9z7 1/1 Running 0 4m5s cert-manager-webhook-d4f79d7f7-9dg9w 1/1 Running 0 4m9sCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can use the cert-manager Operator for Red Hat OpenShift only after cert-manager pods are up and running.
9.3.2. Understanding update channels of the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
Update channels are the mechanism by which you can declare the version of your cert-manager Operator for Red Hat OpenShift in your cluster. The cert-manager Operator for Red Hat OpenShift offers the following update channels:
- 
							
stable-v1 - 
							
stable-v1.y 
9.3.2.1. stable-v1 channel Link kopierenLink in die Zwischenablage kopiert!
						The stable-v1 channel installs and updates the latest release version of the cert-manager Operator for Red Hat OpenShift. Select the stable-v1 channel if you want to use the latest stable release of the cert-manager Operator for Red Hat OpenShift.
					
							The stable-v1 channel is the default and suggested channel while installing the cert-manager Operator for Red Hat OpenShift.
						
						The stable-v1 channel offers the following update approval strategies:
					
- Automatic
 - 
									If you choose automatic updates for an installed cert-manager Operator for Red Hat OpenShift, a new version of the cert-manager Operator for Red Hat OpenShift is available in the 
stable-v1channel. The Operator Lifecycle Manager (OLM) automatically upgrades the running instance of your Operator without human intervention. - Manual
 - If you select manual updates, when a newer version of the cert-manager Operator for Red Hat OpenShift is available, OLM creates an update request. As a cluster administrator, you must then manually approve that update request to have the cert-manager Operator for Red Hat OpenShift updated to the new version.
 
9.3.2.2. stable-v1.y channel Link kopierenLink in die Zwischenablage kopiert!
						The y-stream version of the cert-manager Operator for Red Hat OpenShift installs updates from the stable-v1.y channels such as stable-v1.10, stable-v1.11, and stable-v1.12. Select the stable-v1.y channel if you want to use the y-stream version and stay updated to the z-stream version of the cert-manager Operator for Red Hat OpenShift.
					
						The stable-v1.y channel offers the following update approval strategies:
					
- Automatic
 - 
									If you choose automatic updates for an installed cert-manager Operator for Red Hat OpenShift, a new z-stream version of the cert-manager Operator for Red Hat OpenShift is available in the 
stable-v1.ychannel. OLM automatically upgrades the running instance of your Operator without human intervention. - Manual
 - If you select manual updates, when a newer version of the cert-manager Operator for Red Hat OpenShift is available, OLM creates an update request. As a cluster administrator, you must then manually approve that update request to have the cert-manager Operator for Red Hat OpenShift updated to the new version of the z-stream releases.
 
9.4. Configuring an ACME issuer Link kopierenLink in die Zwischenablage kopiert!
				The cert-manager Operator for Red Hat OpenShift supports using Automated Certificate Management Environment (ACME) CA servers, such as Let’s Encrypt, to issue certificates. Explicit credentials are configured by specifying the secret details in the Issuer API object. Ambient credentials are extracted from the environment, metadata services, or local files which are not explicitly configured in the Issuer API object.
			
					The Issuer object is namespace scoped. It can only issue certificates from the same namespace. You can also use the ClusterIssuer object to issue certificates across all namespaces in the cluster.
				
Example YAML file that defines the ClusterIssuer object
					By default, you can use the ClusterIssuer object with ambient credentials. To use the Issuer object with ambient credentials, you must enable the --issuer-ambient-credentials setting for the cert-manager controller.
				
9.4.1. About ACME issuers Link kopierenLink in die Zwischenablage kopiert!
The ACME issuer type for the cert-manager Operator for Red Hat OpenShift represents an Automated Certificate Management Environment (ACME) certificate authority (CA) server. ACME CA servers rely on a challenge to verify that a client owns the domain names that the certificate is being requested for. If the challenge is successful, the cert-manager Operator for Red Hat OpenShift can issue the certificate. If the challenge fails, the cert-manager Operator for Red Hat OpenShift does not issue the certificate.
Private DNS zones are not supported with Let’s Encrypt and internet ACME servers.
9.4.1.1. Supported ACME challenges types Link kopierenLink in die Zwischenablage kopiert!
The cert-manager Operator for Red Hat OpenShift supports the following challenge types for ACME issuers:
- HTTP-01
 With the HTTP-01 challenge type, you provide a computed key at an HTTP URL endpoint in your domain. If the ACME CA server can get the key from the URL, it can validate you as the owner of the domain.
For more information, see HTTP01 in the upstream cert-manager documentation.
HTTP-01 requires that the Let’s Encrypt servers can access the route of the cluster. If an internal or private cluster is behind a proxy, the HTTP-01 validations for certificate issuance fail.
The HTTP-01 challenge is restricted to port 80. For more information, see HTTP-01 challenge (Let’s Encrypt).
- DNS-01
 With the DNS-01 challenge type, you provide a computed key at a DNS TXT record. If the ACME CA server can get the key by DNS lookup, it can validate you as the owner of the domain.
For more information, see DNS01 in the upstream cert-manager documentation.
9.4.1.2. Supported DNS-01 providers Link kopierenLink in die Zwischenablage kopiert!
The cert-manager Operator for Red Hat OpenShift supports the following DNS-01 providers for ACME issuers:
- Amazon Route 53
 Azure DNS
NoteThe cert-manager Operator for Red Hat OpenShift does not support using Azure Active Directory (Azure AD) pod identities to assign a managed identity to a pod.
- Google Cloud DNS
 Webhook
Red Hat tests and supports DNS providers using an external webhook with cert-manager on OpenShift Container Platform. The following DNS providers are tested and supported with OpenShift Container Platform:
NoteUsing a DNS provider that is not listed might work with OpenShift Container Platform, but the provider was not tested by Red Hat and therefore is not supported by Red Hat.
9.4.2. Configuring an ACME issuer to solve HTTP-01 challenges Link kopierenLink in die Zwischenablage kopiert!
You can use cert-manager Operator for Red Hat OpenShift to set up an ACME issuer to solve HTTP-01 challenges. This procedure uses Let’s Encrypt as the ACME CA server.
Prerequisites
- 
							You have access to the cluster as a user with the 
cluster-adminrole. - 
							You have a service that you want to expose. In this procedure, the service is named 
sample-workload. 
Procedure
Create an ACME cluster issuer.
Create a YAML file that defines the
ClusterIssuerobject:Example
acme-cluster-issuer.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: If you create the object without specifying
ingressClassName, use the following command to patch the existing ingress:oc patch ingress/<ingress-name> --type=merge --patch '{"spec":{"ingressClassName":"openshift-default"}}' -n <namespace>$ oc patch ingress/<ingress-name> --type=merge --patch '{"spec":{"ingressClassName":"openshift-default"}}' -n <namespace>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
ClusterIssuerobject by running the following command:oc create -f acme-cluster-issuer.yaml
$ oc create -f acme-cluster-issuer.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
Create an Ingress to expose the service of the user workload.
Create a YAML file that defines a
Namespaceobject:Example
namespace.yamlfileapiVersion: v1 kind: Namespace metadata: name: my-ingress-namespace
apiVersion: v1 kind: Namespace metadata: name: my-ingress-namespace1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Specify the namespace for the Ingress.
 
Create the
Namespaceobject by running the following command:oc create -f namespace.yaml
$ oc create -f namespace.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a YAML file that defines the
Ingressobject:Example
ingress.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Specify the name of the Ingress.
 - 2
 - Specify the namespace that you created for the Ingress.
 - 3
 - Specify the cluster issuer that you created.
 - 4
 - Specify the Ingress class.
 - 5
 - Specify the Ingress class.
 - 6
 - Replace
<hostname>with the Subject Alternative Name to be associated with the certificate. This name is used to add DNS names to the certificate. - 7
 - Specify the secret to store the created certificate in.
 - 8
 - Replace
<hostname>with the hostname. You can use the<host_name>.<cluster_ingress_domain>syntax to take advantage of the*.<cluster_ingress_domain>wildcard DNS record and serving certificate for the cluster. For example, you might useapps.<cluster_base_domain>. Otherwise, you must ensure that a DNS record exists for the chosen hostname. - 9
 - Specify the name of the service to expose. This example uses a service named
sample-workload. 
Create the
Ingressobject by running the following command:oc create -f ingress.yaml
$ oc create -f ingress.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.4.3. Configuring an ACME issuer by using explicit credentials for AWS Route53 Link kopierenLink in die Zwischenablage kopiert!
You can use cert-manager Operator for Red Hat OpenShift to set up an Automated Certificate Management Environment (ACME) issuer to solve DNS-01 challenges by using explicit credentials on AWS. This procedure uses Let’s Encrypt as the ACME certificate authority (CA) server and shows how to solve DNS-01 challenges with Amazon Route 53.
Prerequisites
You must provide the explicit
accessKeyIDandsecretAccessKeycredentials. For more information, see Route53 in the upstream cert-manager documentation.NoteYou can use Amazon Route 53 with explicit credentials in an OpenShift Container Platform cluster that is not running on AWS.
Procedure
Optional: Override the nameserver settings for the DNS-01 self check.
This step is required only when the target public-hosted zone overlaps with the cluster’s default private-hosted zone.
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Add the
spec.controllerConfigsection. - 2
 - Specify to only use recursive nameservers instead of checking the authoritative nameservers associated with that domain.
 - 3
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the DNS-01 self check. You must use a1.1.1.1:53value to avoid the public and private zones overlapping. 
- Save the file to apply the changes.
 
Optional: Create a namespace for the issuer:
oc new-project <issuer_namespace>
$ oc new-project <issuer_namespace>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a secret to store your AWS credentials in by running the following command:
oc create secret generic aws-secret --from-literal=awsSecretAccessKey=<aws_secret_access_key> \ -n my-issuer-namespace$ oc create secret generic aws-secret --from-literal=awsSecretAccessKey=<aws_secret_access_key> \1 -n my-issuer-namespaceCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Replace
<aws_secret_access_key>with your AWS secret access key. 
Create an issuer:
Create a YAML file that defines the
Issuerobject:Example
issuer.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Provide a name for the issuer.
 - 2
 - Specify the namespace that you created for the issuer.
 - 3
 - Specify the URL to access the ACME server’s
directoryendpoint. This example uses the Let’s Encrypt staging environment. - 4
 - Replace
<email_address>with your email address. - 5
 - Replace
<secret_private_key>with the name of the secret to store the ACME account private key in. - 6
 - Replace
<aws_key_id>with your AWS key ID. - 7
 - Replace
<hosted_zone_id>with your hosted zone ID. - 8
 - Replace
<region_name>with the AWS region name. For example,us-east-1. - 9
 - Specify the name of the secret you created.
 - 10
 - Specify the key in the secret you created that stores your AWS secret access key.
 
Create the
Issuerobject by running the following command:oc create -f issuer.yaml
$ oc create -f issuer.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.4.4. Configuring an ACME issuer by using ambient credentials on AWS Link kopierenLink in die Zwischenablage kopiert!
You can use cert-manager Operator for Red Hat OpenShift to set up an ACME issuer to solve DNS-01 challenges by using ambient credentials on AWS. This procedure uses Let’s Encrypt as the ACME CA server and shows how to solve DNS-01 challenges with Amazon Route 53.
Prerequisites
- If your cluster is configured to use the AWS Security Token Service (STS), you followed the instructions from the Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift for the AWS Security Token Service cluster section.
 - If your cluster does not use the AWS STS, you followed the instructions from the Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift on AWS section.
 
Procedure
Optional: Override the nameserver settings for the DNS-01 self check.
This step is required only when the target public-hosted zone overlaps with the cluster’s default private-hosted zone.
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Add the
spec.controllerConfigsection. - 2
 - Specify to only use recursive nameservers instead of checking the authoritative nameservers associated with that domain.
 - 3
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the DNS-01 self check. You must use a1.1.1.1:53value to avoid the public and private zones overlapping. 
- Save the file to apply the changes.
 
Optional: Create a namespace for the issuer:
oc new-project <issuer_namespace>
$ oc new-project <issuer_namespace>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Modify the
CertManagerresource to add the--issuer-ambient-credentialsargument:oc patch certmanager/cluster \ --type=merge \ -p='{"spec":{"controllerConfig":{"overrideArgs":["--issuer-ambient-credentials"]}}}'$ oc patch certmanager/cluster \ --type=merge \ -p='{"spec":{"controllerConfig":{"overrideArgs":["--issuer-ambient-credentials"]}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an issuer:
Create a YAML file that defines the
Issuerobject:Example
issuer.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Provide a name for the issuer.
 - 2
 - Specify the namespace that you created for the issuer.
 - 3
 - Specify the URL to access the ACME server’s
directoryendpoint. This example uses the Let’s Encrypt staging environment. - 4
 - Replace
<email_address>with your email address. - 5
 - Replace
<secret_private_key>with the name of the secret to store the ACME account private key in. - 6
 - Replace
<hosted_zone_id>with your hosted zone ID. 
Create the
Issuerobject by running the following command:oc create -f issuer.yaml
$ oc create -f issuer.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.4.5. Configuring an ACME issuer by using explicit credentials for Google Cloud DNS Link kopierenLink in die Zwischenablage kopiert!
You can use the cert-manager Operator for Red Hat OpenShift to set up an ACME issuer to solve DNS-01 challenges by using explicit credentials on Google Cloud. This procedure uses Let’s Encrypt as the ACME CA server and shows how to solve DNS-01 challenges with Google Cloud DNS.
Prerequisites
You have set up a Google Cloud service account with a desired role for Google Cloud DNS. For more information, see Google Cloud DNS in the upstream cert-manager documentation.
NoteYou can use Google Cloud DNS with explicit credentials in an OpenShift Container Platform cluster that is not running on Google Cloud.
Procedure
Optional: Override the nameserver settings for the DNS-01 self check.
This step is required only when the target public-hosted zone overlaps with the cluster’s default private-hosted zone.
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Add the
spec.controllerConfigsection. - 2
 - Specify to only use recursive nameservers instead of checking the authoritative nameservers associated with that domain.
 - 3
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the DNS-01 self check. You must use a1.1.1.1:53value to avoid the public and private zones overlapping. 
- Save the file to apply the changes.
 
Optional: Create a namespace for the issuer:
oc new-project my-issuer-namespace
$ oc new-project my-issuer-namespaceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a secret to store your Google Cloud credentials by running the following command:
oc create secret generic clouddns-dns01-solver-svc-acct --from-file=service_account.json=<path/to/gcp_service_account.json> -n my-issuer-namespace
$ oc create secret generic clouddns-dns01-solver-svc-acct --from-file=service_account.json=<path/to/gcp_service_account.json> -n my-issuer-namespaceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create an issuer:
Create a YAML file that defines the
Issuerobject:Example
issuer.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Provide a name for the issuer.
 - 2
 - Replace
<issuer_namespace>with your issuer namespace. - 3
 - Replace
<secret_private_key>with the name of the secret to store the ACME account private key in. - 4
 - Specify the URL to access the ACME server’s
directoryendpoint. This example uses the Let’s Encrypt staging environment. - 5
 - Replace
<project_id>with the name of the Google Cloud project that contains the Cloud DNS zone. - 6
 - Specify the name of the secret you created.
 - 7
 - Specify the key in the secret you created that stores your Google Cloud secret access key.
 
Create the
Issuerobject by running the following command:oc create -f issuer.yaml
$ oc create -f issuer.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.4.6. Configuring an ACME issuer by using ambient credentials on Google Cloud Link kopierenLink in die Zwischenablage kopiert!
You can use the cert-manager Operator for Red Hat OpenShift to set up an ACME issuer to solve DNS-01 challenges by using ambient credentials on Google Cloud. This procedure uses Let’s Encrypt as the ACME CA server and shows how to solve DNS-01 challenges with Google Cloud DNS.
Prerequisites
- If your cluster is configured to use Google Cloud Workload Identity, you followed the instructions from the Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift with Google Cloud Workload Identity section.
 - If your cluster does not use Google Cloud Workload Identity, you followed the instructions from the Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift on Google Cloud section.
 
Procedure
Optional: Override the nameserver settings for the DNS-01 self check.
This step is required only when the target public-hosted zone overlaps with the cluster’s default private-hosted zone.
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Add the
spec.controllerConfigsection. - 2
 - Specify to only use recursive nameservers instead of checking the authoritative nameservers associated with that domain.
 - 3
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the DNS-01 self check. You must use a1.1.1.1:53value to avoid the public and private zones overlapping. 
- Save the file to apply the changes.
 
Optional: Create a namespace for the issuer:
oc new-project <issuer_namespace>
$ oc new-project <issuer_namespace>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Modify the
CertManagerresource to add the--issuer-ambient-credentialsargument:oc patch certmanager/cluster \ --type=merge \ -p='{"spec":{"controllerConfig":{"overrideArgs":["--issuer-ambient-credentials"]}}}'$ oc patch certmanager/cluster \ --type=merge \ -p='{"spec":{"controllerConfig":{"overrideArgs":["--issuer-ambient-credentials"]}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an issuer:
Create a YAML file that defines the
Issuerobject:Example
issuer.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Provide a name for the issuer.
 - 2
 - Replace
<secret_private_key>with the name of the secret to store the ACME account private key in. - 3
 - Specify the URL to access the ACME server’s
directoryendpoint. This example uses the Let’s Encrypt staging environment. - 4
 - Replace
<gcp_project_id>with the name of the Google Cloud project that contains the Cloud DNS zone. 
Create the
Issuerobject by running the following command:oc create -f issuer.yaml
$ oc create -f issuer.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.4.7. Configuring an ACME issuer by using explicit credentials for Microsoft Azure DNS Link kopierenLink in die Zwischenablage kopiert!
You can use cert-manager Operator for Red Hat OpenShift to set up an ACME issuer to solve DNS-01 challenges by using explicit credentials on Microsoft Azure. This procedure uses Let’s Encrypt as the ACME CA server and shows how to solve DNS-01 challenges with Azure DNS.
Prerequisites
You have set up a service principal with desired role for Azure DNS. For more information, see Azure DNS in the upstream cert-manager documentation.
NoteYou can follow this procedure for an OpenShift Container Platform cluster that is not running on Microsoft Azure.
Procedure
Optional: Override the nameserver settings for the DNS-01 self check.
This step is required only when the target public-hosted zone overlaps with the cluster’s default private-hosted zone.
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Add the
spec.controllerConfigsection. - 2
 - Specify to only use recursive nameservers instead of checking the authoritative nameservers associated with that domain.
 - 3
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the DNS-01 self check. You must use a1.1.1.1:53value to avoid the public and private zones overlapping. 
- Save the file to apply the changes.
 
Optional: Create a namespace for the issuer:
oc new-project my-issuer-namespace
$ oc new-project my-issuer-namespaceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a secret to store your Azure credentials in by running the following command:
oc create secret generic <secret_name> --from-literal=<azure_secret_access_key_name>=<azure_secret_access_key_value> \ -n my-issuer-namespace$ oc create secret generic <secret_name> --from-literal=<azure_secret_access_key_name>=<azure_secret_access_key_value> \1 2 3 -n my-issuer-namespaceCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create an issuer:
Create a YAML file that defines the
Issuerobject:Example
issuer.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Provide a name for the issuer.
 - 2
 - Replace
<issuer_namespace>with your issuer namespace. - 3
 - Replace
<secret_private_key>with the name of the secret to store the ACME account private key in. - 4
 - Specify the URL to access the ACME server’s
directoryendpoint. This example uses the Let’s Encrypt staging environment. - 5
 - Replace
<azure_client_id>with your Azure client ID. - 6
 - Replace
<secret_name>with a name of the client secret. - 7
 - Replace
<azure_secret_access_key_name>with the client secret key name. - 8
 - Replace
<azure_subscription_id>with your Azure subscription ID. - 9
 - Replace
<azure_tenant_id>with your Azure tenant ID. - 10
 - Replace
<azure_dns_zone_resource_group>with the name of the Azure DNS zone resource group. - 11
 - Replace
<azure_dns_zone>with the name of Azure DNS zone. 
Create the
Issuerobject by running the following command:oc create -f issuer.yaml
$ oc create -f issuer.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.5. Configuring certificates with an issuer Link kopierenLink in die Zwischenablage kopiert!
By using the cert-manager Operator for Red Hat OpenShift, you can manage certificates, handling tasks such as renewal and issuance, for workloads within the cluster, as well as components interacting externally to the cluster.
9.5.1. Creating certificates for user workloads Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have installed the cert-manager Operator for Red Hat OpenShift.
 
Procedure
- Create an issuer. For more information, see "Configuring an issuer" in the "Additional resources" section.
 Create a certificate:
Create a YAML file, for example,
certificate.yaml, that defines theCertificateobject:Example
certificate.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
Certificateobject by running the following command:oc create -f certificate.yaml
$ oc create -f certificate.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
Verification
Verify that the certificate is created and ready to use by running the following command:
oc get certificate -w -n <issuer_namespace>
$ oc get certificate -w -n <issuer_namespace>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Once certificate is in
Readystatus, workloads on your cluster can start using the generated certificate secret.
9.5.2. Creating certificates for the API server Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have installed version 1.13.0 or later of the cert-manager Operator for Red Hat OpenShift.
 
Procedure
- Create an issuer. For more information, see "Configuring an issuer" in the "Additional resources" section.
 Create a certificate:
Create a YAML file, for example,
certificate.yaml, that defines theCertificateobject:Example
certificate.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
Certificateobject by running the following command:oc create -f certificate.yaml
$ oc create -f certificate.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
- Add the API server named certificate. For more information, see "Adding an API server named certificate" section in the "Additional resources" section.
 
						To ensure the certificates are updated, run the oc login command again after the certificate is created.
					
Verification
Verify that the certificate is created and ready to use by running the following command:
oc get certificate -w -n openshift-config
$ oc get certificate -w -n openshift-configCopy to Clipboard Copied! Toggle word wrap Toggle overflow Once certificate is in
Readystatus, API server on your cluster can start using the generated certificate secret.
9.5.3. Creating certificates for the Ingress Controller Link kopierenLink in die Zwischenablage kopiert!
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have installed version 1.13.0 or later of the cert-manager Operator for Red Hat OpenShift.
 
Procedure
- Create an issuer. For more information, see "Configuring an issuer" in the "Additional resources" section.
 Create a certificate:
Create a YAML file, for example,
certificate.yaml, that defines theCertificateobject:Example
certificate.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
Certificateobject by running the following command:oc create -f certificate.yaml
$ oc create -f certificate.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
- Replace the default ingress certificate. For more information, see "Replacing the default ingress certificate" section in the "Additional resources" section.
 
Verification
Verify that the certificate is created and ready to use by running the following command:
oc get certificate -w -n openshift-ingress
$ oc get certificate -w -n openshift-ingressCopy to Clipboard Copied! Toggle word wrap Toggle overflow Once certificate is in
Readystatus, Ingress Controller on your cluster can start using the generated certificate secret.
9.6. Enabling monitoring for the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
You can expose controller metrics for the cert-manager Operator for Red Hat OpenShift in the format provided by the Prometheus Operator.
9.6.1. Enabling monitoring by using a service monitor for the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
You can enable monitoring and metrics collection for the cert-manager Operator for Red Hat OpenShift by using a service monitor to perform the custom metrics scraping.
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - The cert-manager Operator for Red Hat OpenShift is installed.
 
Procedure
Add the label to enable cluster monitoring by running the following command:
oc label namespace cert-manager openshift.io/cluster-monitoring=true
$ oc label namespace cert-manager openshift.io/cluster-monitoring=trueCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a service monitor:
Create a YAML file that defines the
Role,RoleBinding, andServiceMonitorobjects:Example
monitoring.yamlfileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create the
Role,RoleBinding, andServiceMonitorobjects by running the following command:oc create -f monitoring.yaml
$ oc create -f monitoring.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.6.2. Querying metrics for the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
After you have enabled monitoring for the cert-manager Operator for Red Hat OpenShift, you can query its metrics by using the OpenShift Container Platform web console.
Prerequisites
- 
							You have access to the cluster as a user with the 
cluster-adminrole. - You have installed the cert-manager Operator for Red Hat OpenShift.
 - You have enabled monitoring and metrics collection for the cert-manager Operator for Red Hat OpenShift.
 
Procedure
- 
							From the OpenShift Container Platform web console, navigate to Observe 
Metrics.  Add a query by using one of the following formats:
Specify the endpoints:
{instance="<endpoint>"}{instance="<endpoint>"}1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Replace
<endpoint>with the value of the endpoint for thecert-managerservice. You can find the endpoint value by running the following command:oc describe service cert-manager -n cert-manager. 
Specify the
tcp-prometheus-servicemonitorport:{endpoint="tcp-prometheus-servicemonitor"}{endpoint="tcp-prometheus-servicemonitor"}Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.7. Configuring the egress proxy for the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
				If a cluster-wide egress proxy is configured in OpenShift Container Platform, Operator Lifecycle Manager (OLM) automatically configures Operators that it manages with the cluster-wide proxy. OLM automatically updates all of the Operator’s deployments with the HTTP_PROXY, HTTPS_PROXY, NO_PROXY environment variables.
			
You can inject any CA certificates that are required for proxying HTTPS connections into the cert-manager Operator for Red Hat OpenShift.
9.7.1. Injecting a custom CA certificate for the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
If your OpenShift Container Platform cluster has the cluster-wide proxy enabled, you can inject any CA certificates that are required for proxying HTTPS connections into the cert-manager Operator for Red Hat OpenShift.
Prerequisites
- 
							You have access to the cluster as a user with the 
cluster-adminrole. - You have enabled the cluster-wide proxy for OpenShift Container Platform.
 
Procedure
Create a config map in the
cert-managernamespace by running the following command:oc create configmap trusted-ca -n cert-manager
$ oc create configmap trusted-ca -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Inject the CA bundle that is trusted by OpenShift Container Platform into the config map by running the following command:
oc label cm trusted-ca config.openshift.io/inject-trusted-cabundle=true -n cert-manager
$ oc label cm trusted-ca config.openshift.io/inject-trusted-cabundle=true -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the deployment for the cert-manager Operator for Red Hat OpenShift to use the config map by running the following command:
oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type='merge' -p '{"spec":{"config":{"env":[{"name":"TRUSTED_CA_CONFIGMAP_NAME","value":"trusted-ca"}]}}}'$ oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type='merge' -p '{"spec":{"config":{"env":[{"name":"TRUSTED_CA_CONFIGMAP_NAME","value":"trusted-ca"}]}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
Verification
Verify that the deployments have finished rolling out by running the following command:
oc rollout status deployment/cert-manager-operator-controller-manager -n cert-manager-operator && \ oc rollout status deployment/cert-manager -n cert-manager && \ oc rollout status deployment/cert-manager-webhook -n cert-manager && \ oc rollout status deployment/cert-manager-cainjector -n cert-manager
$ oc rollout status deployment/cert-manager-operator-controller-manager -n cert-manager-operator && \ oc rollout status deployment/cert-manager -n cert-manager && \ oc rollout status deployment/cert-manager-webhook -n cert-manager && \ oc rollout status deployment/cert-manager-cainjector -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
deployment "cert-manager-operator-controller-manager" successfully rolled out deployment "cert-manager" successfully rolled out deployment "cert-manager-webhook" successfully rolled out deployment "cert-manager-cainjector" successfully rolled out
deployment "cert-manager-operator-controller-manager" successfully rolled out deployment "cert-manager" successfully rolled out deployment "cert-manager-webhook" successfully rolled out deployment "cert-manager-cainjector" successfully rolled outCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that the CA bundle was mounted as a volume by running the following command:
oc get deployment cert-manager -n cert-manager -o=jsonpath={.spec.template.spec.'containers[0].volumeMounts'}$ oc get deployment cert-manager -n cert-manager -o=jsonpath={.spec.template.spec.'containers[0].volumeMounts'}Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
[{"mountPath":"/etc/pki/tls/certs/cert-manager-tls-ca-bundle.crt","name":"trusted-ca","subPath":"ca-bundle.crt"}][{"mountPath":"/etc/pki/tls/certs/cert-manager-tls-ca-bundle.crt","name":"trusted-ca","subPath":"ca-bundle.crt"}]Copy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that the source of the CA bundle is the
trusted-caconfig map by running the following command:oc get deployment cert-manager -n cert-manager -o=jsonpath={.spec.template.spec.volumes}$ oc get deployment cert-manager -n cert-manager -o=jsonpath={.spec.template.spec.volumes}Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
[{"configMap":{"defaultMode":420,"name":"trusted-ca"},"name":"trusted-ca"}][{"configMap":{"defaultMode":420,"name":"trusted-ca"},"name":"trusted-ca"}]Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.8. Customizing cert-manager Operator API fields Link kopierenLink in die Zwischenablage kopiert!
You can customize the cert-manager Operator for Red Hat OpenShift API fields by overriding environment variables and arguments.
					To override unsupported arguments, you can add spec.unsupportedConfigOverrides section in the CertManager resource, but using spec.unsupportedConfigOverrides is unsupported.
				
9.8.1. Customizing cert-manager by overriding environment variables from the cert-manager Operator API Link kopierenLink in die Zwischenablage kopiert!
					You can override the supported environment variables for the cert-manager Operator for Red Hat OpenShift by adding a spec.controllerConfig section in the CertManager resource.
				
Prerequisites
- 
							You have access to the OpenShift Container Platform cluster as a user with the 
cluster-adminrole. 
Procedure
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Save your changes and quit the text editor to apply your changes.
 
Verification
Verify that the cert-manager controller pod is redeployed by running the following command:
oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager
$ oc get pods -l app.kubernetes.io/name=cert-manager -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 39s
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 39sCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that environment variables are updated for the cert-manager pod by running the following command:
oc get pod <redeployed_cert-manager_controller_pod> -n cert-manager -o yaml
$ oc get pod <redeployed_cert-manager_controller_pod> -n cert-manager -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.8.2. Customizing cert-manager by overriding arguments from the cert-manager Operator API Link kopierenLink in die Zwischenablage kopiert!
					You can override the supported arguments for the cert-manager Operator for Red Hat OpenShift by adding a spec.controllerConfig section in the CertManager resource.
				
Prerequisites
- 
							You have access to the OpenShift Container Platform cluster as a user with the 
cluster-adminrole. 
Procedure
Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the DNS-01 self check. For example,--dns01-recursive-nameservers=1.1.1.1:53. - 2
 - Specify to only use recursive nameservers instead of checking the authoritative nameservers associated with that domain.
 - 3
 - Provide a comma-separated list of
<host>:<port>nameservers to query for the Automated Certificate Management Environment (ACME) HTTP01 self check. For example,--acme-http01-solver-nameservers=1.1.1.1:53. - 4 7 8
 - Specify to set the log level verbosity to determine the verbosity of log messages.
 - 5
 - Specify the host and port for the metrics endpoint. The default value is
--metrics-listen-address=0.0.0.0:9402. - 6
 - You must use the
--issuer-ambient-credentialsargument when configuring an ACME Issuer to solve DNS-01 challenges by using ambient credentials. 
- Save your changes and quit the text editor to apply your changes.
 
Verification
Verify that arguments are updated for cert-manager pods by running the following command:
oc get pods -n cert-manager -o yaml
$ oc get pods -n cert-manager -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.8.3. Deleting a TLS secret automatically upon Certificate removal Link kopierenLink in die Zwischenablage kopiert!
					You can enable the --enable-certificate-owner-ref flag for the cert-manager Operator for Red Hat OpenShift by adding a spec.controllerConfig section in the CertManager resource. The --enable-certificate-owner-ref flag sets the certificate resource as an owner of the secret where the TLS certificate is stored.
				
If you uninstall the cert-manager Operator for Red Hat OpenShift or delete certificate resources from the cluster, the secret is deleted automatically. This might cause network connectivity issues depending upon where the certificate TLS secret is being used.
Prerequisites
- 
							You have access to the OpenShift Container Platform cluster as a user with the 
cluster-adminrole. - You have installed version 1.12.0 or later of the cert-manager Operator for Red Hat OpenShift.
 
Procedure
Check that the
Certificateobject and its secret are available by running the following command:oc get certificate
$ oc get certificateCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY SECRET AGE certificate-from-clusterissuer-route53-ambient True certificate-from-clusterissuer-route53-ambient 8h
NAME READY SECRET AGE certificate-from-clusterissuer-route53-ambient True certificate-from-clusterissuer-route53-ambient 8hCopy to Clipboard Copied! Toggle word wrap Toggle overflow Edit the
CertManagerresource by running the following command:oc edit certmanager cluster
$ oc edit certmanager clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add a
spec.controllerConfigsection with the following override arguments:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Save your changes and quit the text editor to apply your changes.
 
Verification
Verify that the
--enable-certificate-owner-refflag is updated for cert-manager controller pod by running the following command:oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager -o yaml
$ oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.8.4. Overriding CPU and memory limits for the cert-manager components Link kopierenLink in die Zwischenablage kopiert!
After installing the cert-manager Operator for Red Hat OpenShift, you can configure the CPU and memory limits from the cert-manager Operator for Red Hat OpenShift API for the cert-manager components such as cert-manager controller, CA injector, and Webhook.
Prerequisites
- 
							You have access to the OpenShift Container Platform cluster as a user with the 
cluster-adminrole. - You have installed version 1.12.0 or later of the cert-manager Operator for Red Hat OpenShift.
 
Procedure
Check that the deployments of the cert-manager controller, CA injector, and Webhook are available by entering the following command:
oc get deployment -n cert-manager
$ oc get deployment -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY UP-TO-DATE AVAILABLE AGE cert-manager 1/1 1 1 53m cert-manager-cainjector 1/1 1 1 53m cert-manager-webhook 1/1 1 1 53m
NAME READY UP-TO-DATE AVAILABLE AGE cert-manager 1/1 1 1 53m cert-manager-cainjector 1/1 1 1 53m cert-manager-webhook 1/1 1 1 53mCopy to Clipboard Copied! Toggle word wrap Toggle overflow Before setting the CPU and memory limit, check the existing configuration for the cert-manager controller, CA injector, and Webhook by entering the following command:
oc get deployment -n cert-manager -o yaml
$ oc get deployment -n cert-manager -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To configure the CPU and memory limits for the cert-manager controller, CA injector, and Webhook, enter the following command:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Defines the maximum amount of CPU and memory that a single container in a cert-manager controller pod can request.
 - 2 5
 - You can specify the CPU limit that a cert-manager controller pod can request. The default value is
10m. - 3 6
 - You can specify the memory limit that a cert-manager controller pod can request. The default value is
32Mi. - 4
 - Defines the amount of CPU and memory set by scheduler for the cert-manager controller pod.
 - 7
 - Defines the maximum amount of CPU and memory that a single container in a CA injector pod can request.
 - 8 11
 - You can specify the CPU limit that a CA injector pod can request. The default value is
10m. - 9 12
 - You can specify the memory limit that a CA injector pod can request. The default value is
32Mi. - 10
 - Defines the amount of CPU and memory set by scheduler for the CA injector pod.
 - 13
 - Defines the maximum amount of CPU and memory Defines the maximum amount of CPU and memory that a single container in a Webhook pod can request.
 - 14 17
 - You can specify the CPU limit that a Webhook pod can request. The default value is
10m. - 15 18
 - You can specify the memory limit that a Webhook pod can request. The default value is
32Mi. - 16
 - Defines the amount of CPU and memory set by scheduler for the Webhook pod.
 
Example output
certmanager.operator.openshift.io/cluster patched
certmanager.operator.openshift.io/cluster patchedCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
Verification
Verify that the CPU and memory limits are updated for the cert-manager components:
oc get deployment -n cert-manager -o yaml
$ oc get deployment -n cert-manager -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.9. Authenticating the cert-manager Operator for Red Hat OpenShift with AWS Security Token Service Link kopierenLink in die Zwischenablage kopiert!
				You can authenticate the cert-manager Operator for Red Hat OpenShift on the AWS Security Token Service (STS) cluster. You can configure cloud credentials for the cert-manager Operator for Red Hat OpenShift by using the ccoctl binary.
			
9.9.1. Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift for the AWS Security Token Service cluster Link kopierenLink in die Zwischenablage kopiert!
					To configure the cloud credentials for the cert-manager Operator for Red Hat OpenShift on the AWS Security Token Service (STS) cluster with the cloud credentials. You must generate the cloud credentials manually, and apply it on the cluster by using the ccoctl binary.
				
Prerequisites
- 
							You have extracted and prepared the 
ccoctlbinary. - You have configured an OpenShift Container Platform cluster with AWS STS by using the Cloud Credential Operator in manual mode.
 
Procedure
Create a directory to store a
CredentialsRequestresource YAML file by running the following command:mkdir credentials-request
$ mkdir credentials-requestCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
CredentialsRequestresource YAML file under thecredentials-requestdirectory, such as,sample-credential-request.yaml, by applying the following yaml:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the
ccoctltool to processCredentialsRequestobjects by running the following command:ccoctl aws create-iam-roles \ --name <user_defined_name> --region=<aws_region> \ --credentials-requests-dir=<path_to_credrequests_dir> \ --identity-provider-arn <oidc_provider_arn> --output-dir=<path_to_output_dir>$ ccoctl aws create-iam-roles \ --name <user_defined_name> --region=<aws_region> \ --credentials-requests-dir=<path_to_credrequests_dir> \ --identity-provider-arn <oidc_provider_arn> --output-dir=<path_to_output_dir>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
2023/05/15 18:10:34 Role arn:aws:iam::XXXXXXXXXXXX:role/<user_defined_name>-cert-manager-aws-creds created 2023/05/15 18:10:34 Saved credentials configuration to: <path_to_output_dir>/manifests/cert-manager-aws-creds-credentials.yaml 2023/05/15 18:10:35 Updated Role policy for Role <user_defined_name>-cert-manager-aws-creds
2023/05/15 18:10:34 Role arn:aws:iam::XXXXXXXXXXXX:role/<user_defined_name>-cert-manager-aws-creds created 2023/05/15 18:10:34 Saved credentials configuration to: <path_to_output_dir>/manifests/cert-manager-aws-creds-credentials.yaml 2023/05/15 18:10:35 Updated Role policy for Role <user_defined_name>-cert-manager-aws-credsCopy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the
<aws_role_arn>from the output to use in the next step. For example,"arn:aws:iam::XXXXXXXXXXXX:role/<user_defined_name>-cert-manager-aws-creds"Add the
eks.amazonaws.com/role-arn="<aws_role_arn>"annotation to the service account by running the following command:oc -n cert-manager annotate serviceaccount cert-manager eks.amazonaws.com/role-arn="<aws_role_arn>"
$ oc -n cert-manager annotate serviceaccount cert-manager eks.amazonaws.com/role-arn="<aws_role_arn>"Copy to Clipboard Copied! Toggle word wrap Toggle overflow To create a new pod, delete the existing cert-manager controller pod by running the following command:
oc delete pods -l app.kubernetes.io/name=cert-manager -n cert-manager
$ oc delete pods -l app.kubernetes.io/name=cert-manager -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow The AWS credentials are applied to a new cert-manager controller pod within a minute.
Verification
Get the name of the updated cert-manager controller pod by running the following command:
oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager
$ oc get pods -l app.kubernetes.io/name=cert-manager -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 39s
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 39sCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that AWS credentials are updated by running the following command:
oc set env -n cert-manager po/<cert_manager_controller_pod_name> --list
$ oc set env -n cert-manager po/<cert_manager_controller_pod_name> --listCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
pods/cert-manager-57f9555c54-vbcpg, container cert-manager-controller POD_NAMESPACE from field path metadata.namespace
# pods/cert-manager-57f9555c54-vbcpg, container cert-manager-controller # POD_NAMESPACE from field path metadata.namespace AWS_ROLE_ARN=XXXXXXXXXXXX AWS_WEB_IDENTITY_TOKEN_FILE=/var/run/secrets/eks.amazonaws.com/serviceaccount/tokenCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.10. Configuring log levels for cert-manager and the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
To troubleshoot issues with the cert-manager components and the cert-manager Operator for Red Hat OpenShift, you can configure the log level verbosity.
To use different log levels for different cert-manager components, see Customizing cert-manager Operator API fields.
9.10.1. Setting a log level for cert-manager Link kopierenLink in die Zwischenablage kopiert!
You can set a log level for cert-manager to determine the verbosity of log messages.
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have installed version 1.11.1 or later of the cert-manager Operator for Red Hat OpenShift.
 
Procedure
Edit the
CertManagerresource by running the following command:oc edit certmanager.operator cluster
$ oc edit certmanager.operator clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Set the log level value by editing the
spec.logLevelsection:apiVersion: operator.openshift.io/v1alpha1 kind: CertManager ... spec: logLevel: Normal
apiVersion: operator.openshift.io/v1alpha1 kind: CertManager ... spec: logLevel: Normal1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - The default
logLevelisNormal. ReplaceNormalwith the desired log level value. The valid log level values for theCertManagerresource areNormal,Debug,Trace, andTraceAll. To audit logs and perform common operations when everything is fine, setlogLeveltoNormal. To troubleshoot a minor issue by viewing verbose logs, setlogLeveltoDebug. To troubleshoot a major issue by viewing more verbose logs, you can setlogLeveltoTrace. To troubleshoot serious issues, setlogLeveltoTraceAll. 
NoteTraceAllgenerates huge amount of logs. After settinglogLeveltoTraceAll, you might experience performance issues.Save your changes and quit the text editor to apply your changes.
After applying the changes, the verbosity level for the cert-manager components controller, CA injector, and webhook is updated.
9.10.2. Setting a log level for the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
You can set a log level for the cert-manager Operator for Red Hat OpenShift to determine the verbosity of the operator log messages.
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have installed version 1.11.1 or later of the cert-manager Operator for Red Hat OpenShift.
 
Procedure
Update the subscription object for cert-manager Operator for Red Hat OpenShift to provide the verbosity level for the operator logs by running the following command:
oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type='merge' -p '{"spec":{"config":{"env":[{"name":"OPERATOR_LOG_LEVEL","value":"v"}]}}}'$ oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type='merge' -p '{"spec":{"config":{"env":[{"name":"OPERATOR_LOG_LEVEL","value":"v"}]}}}'1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
 - Replace
vwith the desired log level number. The valid values forvcan range from1`to `10. The default value is2. 
Verification
The cert-manager Operator pod is redeployed. Verify that the log level of the cert-manager Operator for Red Hat OpenShift is updated by running the following command:
oc set env deploy/cert-manager-operator-controller-manager -n cert-manager-operator --list | grep -e OPERATOR_LOG_LEVEL -e container
$ oc set env deploy/cert-manager-operator-controller-manager -n cert-manager-operator --list | grep -e OPERATOR_LOG_LEVEL -e containerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
deployments/cert-manager-operator-controller-manager, container kube-rbac-proxy deployments/cert-manager-operator-controller-manager, container cert-manager-operator
# deployments/cert-manager-operator-controller-manager, container kube-rbac-proxy OPERATOR_LOG_LEVEL=9 # deployments/cert-manager-operator-controller-manager, container cert-manager-operator OPERATOR_LOG_LEVEL=9Copy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that the log level of the cert-manager Operator for Red Hat OpenShift is updated by running the
oc logscommand:oc logs deploy/cert-manager-operator-controller-manager -n cert-manager-operator
$ oc logs deploy/cert-manager-operator-controller-manager -n cert-manager-operatorCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.11. Authenticating the cert-manager Operator for Red Hat OpenShift with GCP Workload Identity Link kopierenLink in die Zwischenablage kopiert!
				You can authenticate the cert-manager Operator for Red Hat OpenShift on the GCP Workload Identity cluster by using the cloud credentials. You can configure the cloud credentials by using the ccoctl binary.
			
9.11.1. Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift with Google Cloud Workload Identity Link kopierenLink in die Zwischenablage kopiert!
					Generate the cloud credentials for the cert-manager Operator for Red Hat OpenShift by using the ccoctl binary. Then, apply them to the Google Cloud Workload Identity cluster.
				
Prerequisites
- 
							You extracted and prepared the 
ccoctlbinary. - You have installed version 1.11.1 or later of the cert-manager Operator for Red Hat OpenShift.
 - You have configured an OpenShift Container Platform cluster with Google Cloud Workload Identity by using the Cloud Credential Operator in a manual mode.
 
Procedure
Create a directory to store a
CredentialsRequestresource YAML file by running the following command:mkdir credentials-request
$ mkdir credentials-requestCopy to Clipboard Copied! Toggle word wrap Toggle overflow In the
credentials-requestdirectory, create a YAML file that contains the followingCredentialsRequestmanifest:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
dns.adminrole provides admin privileges to the service account for managing Google Cloud DNS resources. To ensure that the cert-manager runs with the service account that has the least privilege, you can create a custom role with the following permissions:- 
										
dns.resourceRecordSets.* - 
										
dns.changes.* - 
										
dns.managedZones.list 
- 
										
 Use the
ccoctltool to processCredentialsRequestobjects by running the following command:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example command
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Apply the secrets generated in the manifests directory of your cluster by running the following command:
ls <path_to_output_dir>/manifests/*-credentials.yaml | xargs -I{} oc apply -f {}$ ls <path_to_output_dir>/manifests/*-credentials.yaml | xargs -I{} oc apply -f {}Copy to Clipboard Copied! Toggle word wrap Toggle overflow Update the subscription object for cert-manager Operator for Red Hat OpenShift by running the following command:
oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type=merge -p '{"spec":{"config":{"env":[{"name":"CLOUD_CREDENTIALS_SECRET_NAME","value":"gcp-credentials"}]}}}'$ oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type=merge -p '{"spec":{"config":{"env":[{"name":"CLOUD_CREDENTIALS_SECRET_NAME","value":"gcp-credentials"}]}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
Verification
Get the name of the redeployed cert-manager controller pod by running the following command:
oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager
$ oc get pods -l app.kubernetes.io/name=cert-manager -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 15m39s
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 15m39sCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that the cert-manager controller pod is updated with Google Cloud workload identity credential volumes that are mounted under the path specified in
mountPathby running the following command:oc get -n cert-manager pod/<cert-manager_controller_pod_name> -o yaml
$ oc get -n cert-manager pod/<cert-manager_controller_pod_name> -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.12. Authenticating the cert-manager Operator for Red Hat OpenShift on AWS Link kopierenLink in die Zwischenablage kopiert!
You can configure the cloud credentials for the cert-manager Operator for Red Hat OpenShift on the AWS cluster. The cloud credentials are generated by the Cloud Credential Operator.
9.12.1. Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift on AWS Link kopierenLink in die Zwischenablage kopiert!
					To configure the cloud credentials for the cert-manager Operator for Red Hat OpenShift on the AWS cluster you must generate the cloud credentials secret by creating a CredentialsRequest object, and allowing the Cloud Credential Operator.
				
Prerequisites
- You have installed version 1.11.1 or later of the cert-manager Operator for Red Hat OpenShift.
 - You have configured the Cloud Credential Operator to operate in mint or passthrough mode.
 
Procedure
Create a
CredentialsRequestresource YAML file, for example,sample-credential-request.yaml, as follows:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a
CredentialsRequestresource by running the following command:oc create -f sample-credential-request.yaml
$ oc create -f sample-credential-request.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the subscription object for cert-manager Operator for Red Hat OpenShift by running the following command:
oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type=merge -p '{"spec":{"config":{"env":[{"name":"CLOUD_CREDENTIALS_SECRET_NAME","value":"aws-creds"}]}}}'$ oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type=merge -p '{"spec":{"config":{"env":[{"name":"CLOUD_CREDENTIALS_SECRET_NAME","value":"aws-creds"}]}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
Verification
Get the name of the redeployed cert-manager controller pod by running the following command:
oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager
$ oc get pods -l app.kubernetes.io/name=cert-manager -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 15m39s
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 15m39sCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that the cert-manager controller pod is updated with AWS credential volumes that are mounted under the path specified in
mountPathby running the following command:oc get -n cert-manager pod/<cert-manager_controller_pod_name> -o yaml
$ oc get -n cert-manager pod/<cert-manager_controller_pod_name> -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.13. Authenticating the cert-manager Operator for Red Hat OpenShift on GCP Link kopierenLink in die Zwischenablage kopiert!
You can configure cloud credentials for the cert-manager Operator for Red Hat OpenShift on a GCP cluster. The cloud credentials are generated by the Cloud Credential Operator.
9.13.1. Configuring cloud credentials for the cert-manager Operator for Red Hat OpenShift on Google Cloud Link kopierenLink in die Zwischenablage kopiert!
					To configure the cloud credentials for the cert-manager Operator for Red Hat OpenShift on a Google Cloud cluster you must create a CredentialsRequest object, and allow the Cloud Credential Operator to generate the cloud credentials secret.
				
Prerequisites
- You have installed version 1.11.1 or later of the cert-manager Operator for Red Hat OpenShift.
 - You have configured the Cloud Credential Operator to operate in mint or passthrough mode.
 
Procedure
Create a
CredentialsRequestresource YAML file, such as,sample-credential-request.yamlby applying the following yaml:Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe
dns.adminrole provides admin privileges to the service account for managing Google Cloud DNS resources. To ensure that the cert-manager runs with the service account that has the least privilege, you can create a custom role with the following permissions:- 
										
dns.resourceRecordSets.* - 
										
dns.changes.* - 
										
dns.managedZones.list 
- 
										
 Create a
CredentialsRequestresource by running the following command:oc create -f sample-credential-request.yaml
$ oc create -f sample-credential-request.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the subscription object for cert-manager Operator for Red Hat OpenShift by running the following command:
oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type=merge -p '{"spec":{"config":{"env":[{"name":"CLOUD_CREDENTIALS_SECRET_NAME","value":"gcp-credentials"}]}}}'$ oc -n cert-manager-operator patch subscription openshift-cert-manager-operator --type=merge -p '{"spec":{"config":{"env":[{"name":"CLOUD_CREDENTIALS_SECRET_NAME","value":"gcp-credentials"}]}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
Verification
Get the name of the redeployed cert-manager controller pod by running the following command:
oc get pods -l app.kubernetes.io/name=cert-manager -n cert-manager
$ oc get pods -l app.kubernetes.io/name=cert-manager -n cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 15m39s
NAME READY STATUS RESTARTS AGE cert-manager-bd7fbb9fc-wvbbt 1/1 Running 0 15m39sCopy to Clipboard Copied! Toggle word wrap Toggle overflow Verify that the cert-manager controller pod is updated with Google Cloud credential volumes that are mounted under the path specified in
mountPathby running the following command:oc get -n cert-manager pod/<cert-manager_controller_pod_name> -o yaml
$ oc get -n cert-manager pod/<cert-manager_controller_pod_name> -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
9.14. Uninstalling the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
You can remove the cert-manager Operator for Red Hat OpenShift from OpenShift Container Platform by uninstalling the Operator and removing its related resources.
9.14.1. Uninstalling the cert-manager Operator for Red Hat OpenShift Link kopierenLink in die Zwischenablage kopiert!
You can uninstall the cert-manager Operator for Red Hat OpenShift by using the web console.
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have access to the OpenShift Container Platform web console.
 - The cert-manager Operator for Red Hat OpenShift is installed.
 
Procedure
- Log in to the OpenShift Container Platform web console.
 Uninstall the cert-manager Operator for Red Hat OpenShift Operator.
- 
									Navigate to Operators 
Installed Operators.  - 
									Click the Options menu 
									
									 next to the cert-manager Operator for Red Hat OpenShift entry and click Uninstall Operator.
								 - In the confirmation dialog, click Uninstall.
 
- 
									Navigate to Operators 
 
9.14.2. Removing cert-manager Operator for Red Hat OpenShift resources Link kopierenLink in die Zwischenablage kopiert!
Once you have uninstalled the cert-manager Operator for Red Hat OpenShift, you have the option to eliminate its associated resources from your cluster.
Prerequisites
- 
							You have access to the cluster with 
cluster-adminprivileges. - You have access to the OpenShift Container Platform web console.
 
Procedure
- Log in to the OpenShift Container Platform web console.
 Remove the deployments of the cert-manager components, such as
cert-manager,cainjector, andwebhook, present in thecert-managernamespace.- Click the Project drop-down menu to see a list of all available projects, and select the cert-manager project.
 - 
									Navigate to Workloads 
Deployments.  - Select the deployment that you want to delete.
 - Click the Actions drop-down menu, and select Delete Deployment to see a confirmation dialog box.
 - Click Delete to delete the deployment.
 Alternatively, delete deployments of the cert-manager components such as
cert-manager,cainjectorandwebhookpresent in thecert-managernamespace by using the command-line interface (CLI).oc delete deployment -n cert-manager -l app.kubernetes.io/instance=cert-manager
$ oc delete deployment -n cert-manager -l app.kubernetes.io/instance=cert-managerCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
Optional: Remove the custom resource definitions (CRDs) that were installed by the cert-manager Operator for Red Hat OpenShift:
- 
									Navigate to Administration 
CustomResourceDefinitions.  - 
									Enter 
certmanagerin the Name field to filter the CRDs. Click the Options menu
									 next to each of the following CRDs, and select Delete Custom Resource Definition:
								- 
											
Certificate - 
											
CertificateRequest - 
											
CertManager(operator.openshift.io) - 
											
Challenge - 
											
ClusterIssuer - 
											
Issuer - 
											
Order 
- 
											
 
- 
									Navigate to Administration 
 Optional: Remove the
cert-manager-operatornamespace.- 
									Navigate to Administration 
Namespaces.  - 
									Click the Options menu 
									
									 next to the cert-manager-operator and select Delete Namespace.
								 - 
									In the confirmation dialog, enter 
cert-manager-operatorin the field and click Delete. 
- 
									Navigate to Administration