Chapter 3. Using certificate manager on a MicroShift node


The MicroShift certificate manager supports managing TLS certificates. This integration results in the issue, renewal, and management of certificate from certificate authorities.

3.1. MicroShift certificate manager functions

With MicroShift certificate manager, you can complete the following tasks:

  • Automates certificate management: cert-manager creates or updates certificates and detects Kubernetes resources that are annotated with cert-manager.io/kind.
  • Supports multiple CAs: provides flexibility to select one that fits the security and operational needs.
  • Simplifies ingress certificates: cert-manager handles certificates for an ingress controller, which simplifies the configuration and management of secure communication channels.
  • Enhances security: certificate management is automated and the risk of error is reduced. Certificates are current and valid, which contribute to a secure environment.

The microshift-cert-manager RPM is an optional component that can be installed at any time. Follow these steps to install and verify the certificate manager:

Procedure

  1. Install the cert-manager-operator using the microshift-cert-manager RPM by running the following command:

    $ sudo dnf install microshift-cert-manager
    Copy to Clipboard Toggle word wrap
  2. Verify the certificate manager versions that are used by running the following command:

    $ rpm -qi microshift-cert-manager
    Copy to Clipboard Toggle word wrap
  3. Restart MicroShift by running the following command:

    $ systemctl microshift restart
    Copy to Clipboard Toggle word wrap
  4. Verify that the microshift-cert-manager RPM is installed by running the following command:

    $ oc get deployment -n  cert-manager-operator
    Copy to Clipboard Toggle word wrap

    Example output

    NAME                                       READY   UP-TO-DATE   AVAILABLE   AGE
    cert-manager-operator-controller-manager   1/1     1            1           2d22h
    Copy to Clipboard Toggle word wrap

  5. Verify that the`cert-manager` deployments are in a ready state and are up-to-date in the cert-manager namespace by running the following command:

    $ oc get deployment -n cert-manager
    Copy to Clipboard Toggle word wrap

    Example output

    NAME                      READY   UP-TO-DATE   AVAILABLE   AGE
    cert-manager              1/1     1            1           2d22h
    cert-manager-cainjector   1/1     1            1           2d22h
    cert-manager-webhook      1/1     1            1           2d22h
    Copy to Clipboard Toggle word wrap

  6. Verify that the pods are running in the cert-manager namespace by running the following command:

    $ oc get pods -n cert-manager
    Copy to Clipboard Toggle word wrap

    Example output

    NAME                                       READY   STATUS    RESTARTS   AGE
    cert-manager-7cfb4fbb84-qdmk8              1/1     Running   2          2d22h
    cert-manager-cainjector-854f669657-xzs8b   1/1     Running   2          2d22h
    cert-manager-webhook-68fd6d5f5c-j942h      1/1     Running   2          2d22h
    Copy to Clipboard Toggle word wrap

You can install the optional microshift-cert-manager by using OLM at any time. For more information, see Using Operator Lifecycle Manager with MicroShift and Installing the cert-manager Operator for Red Hat OpenShift.

Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat