Questo contenuto non è disponibile nella lingua selezionata.
Chapter 11. Adding custom SSL/TLS certificates when Red Hat Quay is deployed on Kubernetes
When deployed on Kubernetes, Red Hat Quay mounts in a secret as a volume to store config assets. Currently, this breaks the upload certificate function of the superuser panel.
			As a temporary workaround, base64 encoded certificates can be added to the secret after Red Hat Quay has been deployed.
		
Use the following procedure to add custom SSL/TLS certificates when Red Hat Quay is deployed on Kubernetes.
Prerequisites
- Red Hat Quay has been deployed.
- 
					You have a custom ca.crtfile.
Procedure
- Base64 encode the contents of an SSL/TLS certificate by entering the following command: - cat ca.crt | base64 -w 0 - $ cat ca.crt | base64 -w 0- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Example output - ...c1psWGpqeGlPQmNEWkJPMjJ5d0pDemVnR2QNCnRsbW9JdEF4YnFSdVd3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= - ...c1psWGpqeGlPQmNEWkJPMjJ5d0pDemVnR2QNCnRsbW9JdEF4YnFSdVd3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Enter the following - kubectlcommand to edit the- quay-enterprise-config-secretfile:- kubectl --namespace quay-enterprise edit secret/quay-enterprise-config-secret - $ kubectl --namespace quay-enterprise edit secret/quay-enterprise-config-secret- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Add an entry for the certificate and paste the full - base64encoded stringer under the entry. For example:- custom-cert.crt: c1psWGpqeGlPQmNEWkJPMjJ5d0pDemVnR2QNCnRsbW9JdEF4YnFSdVd3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= - custom-cert.crt: c1psWGpqeGlPQmNEWkJPMjJ5d0pDemVnR2QNCnRsbW9JdEF4YnFSdVd3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow 
- Use the - kubectl deletecommand to remove all Red Hat Quay pods. For example:- kubectl delete pod quay-operator.v3.7.1-6f9d859bd-p5ftc quayregistry-clair-postgres-7487f5bd86-xnxpr quayregistry-quay-app-upgrade-xq2v6 quayregistry-quay-database-859d5445ff-cqthr quayregistry-quay-redis-84f888776f-hhgms - $ kubectl delete pod quay-operator.v3.7.1-6f9d859bd-p5ftc quayregistry-clair-postgres-7487f5bd86-xnxpr quayregistry-quay-app-upgrade-xq2v6 quayregistry-quay-database-859d5445ff-cqthr quayregistry-quay-redis-84f888776f-hhgms- Copy to Clipboard Copied! - Toggle word wrap Toggle overflow - Afterwards, the Red Hat Quay deployment automatically schedules replace pods with the new certificate data.