Chapter 12. Deploying TLS for public endpoints using director Operator
Deploy the overcloud using TLS to create public endpoint IPs or DNS names for RHOSP Director Operator.
Prerequisites
- Your OpenShift Container Platform cluster is operational.
- You have installed director Operator correctly.
-
You have installed the
oc
command line tool on your workstation.
12.1. TLS for public endpoint IP addresses Copy linkLink copied to clipboard!
To reference public endpoint IP addresses, add certificates to the openstackclient
pod.
Prerequisites
- Create the certificate authority, key, and certificate using the procedure: Enabling SSL/TLS on overcloud public endpoints.
Procedure
Create a
ConfigMap
to store the CA certificates. TheConfigMap
is the interface used to add CA certificates to theopenstackclient
pod, using the OpenStackControlPlane object:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the OpenStackControlPlane and reference the
ConfigMap
:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<overcloud>
with the name of your stack.
-
Replace
In the
~/custom_environment_files
directory create a file calledtls-certs.yaml
containing the generated certificates for the deployment usingSSLCertificate
,SSLIntermediateCertificate
,SSLKey
, andCAMap
parameters.NoteFor more information on creating a certificate file, see Enabling SSL/TLS.
Update the
heatEnvConfigMap
to add thetls-certs.yaml
file:oc create configmap -n openstack heat-env-config --from-file=~/custom_environment_files/ --dry-run=client -o yaml | oc apply -f -
$ oc create configmap -n openstack heat-env-config --from-file=~/custom_environment_files/ --dry-run=client -o yaml | oc apply -f -
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an OpenStackConfigGenerator and add the required
heatEnvs
configuration files to configure TLS for public endpoint IPs:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The OpenStackConfigGenerator and a new OpenStackConfigVersion are created, run the Ansible playbooks against the overcloud using the OpenStackDeploy resource:
12.2. TLS for public endpoint DNS names Copy linkLink copied to clipboard!
To reference public endpoint DNS names add certificates to the openstackclient
pod.
Prerequisites
- Create the certificate authority, key, and certificate following the procedure in, Enabling SSL/TLS on overcloud public endpoints.
Procedure
Create a
ConfigMap
to store the CA certificates. TheConfigMap
is the interface used to add additional CA certificates to theopenstackclient
pod, using the OpenStackControlPlane object:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create the OpenStackControlPlane and reference the
ConfigMap
:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
Replace
<overcloud>
with the name of your stack.
-
Replace
In the
~/custom_environment_files
directory create a file calledtls-certs.yaml
containing the generated certificates for the deployment usingSSLCertificate
,SSLIntermediateCertificate
,SSLKey
, andCAMap
parameters.NoteFor more information on creating a certificate file, see Enabling SSL/TLS.
Update the
heatEnvConfigMap
to add thetls-certs.yaml
file:oc create configmap -n openstack heat-env-config --from-file=~/custom_environment_files/ --dry-run=client -o yaml | oc apply -f -
$ oc create configmap -n openstack heat-env-config --from-file=~/custom_environment_files/ --dry-run=client -o yaml | oc apply -f -
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create an OpenStackConfigGenerator and add the required
heatEnvs
configuration files to configure TLS for public endpoint DNS names:Copy to Clipboard Copied! Toggle word wrap Toggle overflow The OpenStackConfigGenerator and a new OpenStackConfigVersion are created, run the Ansible playbooks against the overcloud using the OpenStackDeploy resource: