OpenShift Container Storage is now OpenShift Data Foundation starting with version 4.9.
Chapter 7. Configuring SSL access between S3 endpoints
Configure network (SSL) access between the s3 endpoints so that metadata can be stored on the alternate cluster in a MCG object bucket using a secure transport protocol and in the Hub cluster for verifying access to the object buckets.
If all of your OpenShift clusters are deployed using a signed and valid set of certificates for your environment then this section can be skipped.
Procedure
Extract the ingress certificate for the Primary managed cluster and save the output to
primary.crt.oc get cm default-ingress-cert -n openshift-config-managed -o jsonpath="{['data']['ca-bundle\.crt']}" > primary.crt$ oc get cm default-ingress-cert -n openshift-config-managed -o jsonpath="{['data']['ca-bundle\.crt']}" > primary.crtCopy to Clipboard Copied! Toggle word wrap Toggle overflow Extract the ingress certificate for the Secondary managed cluster and save the output to
secondary.crt.oc get cm default-ingress-cert -n openshift-config-managed -o jsonpath="{['data']['ca-bundle\.crt']}" > secondary.crt$ oc get cm default-ingress-cert -n openshift-config-managed -o jsonpath="{['data']['ca-bundle\.crt']}" > secondary.crtCopy to Clipboard Copied! Toggle word wrap Toggle overflow Create a new ConfigMap to hold the remote cluster’s certificate bundle with filename
cm-clusters-crt.yamlon the Primary managed cluster, Secondary managed cluster, and the Hub cluster.NoteThere could be more or less than three certificates for each cluster as shown in this example file. Also, ensure that the certificate contents are correctly indented after you copy and paste from the
primary.crtandsecondary.crtfiles that were created before.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the ConfigMap file on the Primary managed cluster, Secondary managed cluster, and the Hub cluster.
oc create -f cm-clusters-crt.yaml
$ oc create -f cm-clusters-crt.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output:
configmap/user-ca-bundle created
configmap/user-ca-bundle createdCopy to Clipboard Copied! Toggle word wrap Toggle overflow ImportantFor the Hub cluster to verify access to the object buckets using the DRPolicy resource, the same ConfigMap
cm-clusters-crt.yamlmust also be created on the Hub cluster.Patch default proxy resource on the Primary managed cluster, Secondary managed cluster, and the Hub cluster.
oc patch proxy cluster --type=merge --patch='{"spec":{"trustedCA":{"name":"user-ca-bundle"}}}'$ oc patch proxy cluster --type=merge --patch='{"spec":{"trustedCA":{"name":"user-ca-bundle"}}}'Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example output:
proxy.config.openshift.io/cluster patched
proxy.config.openshift.io/cluster patchedCopy to Clipboard Copied! Toggle word wrap Toggle overflow