このコンテンツは選択した言語では利用できません。

Chapter 3. Using certificate manager on a MicroShift node


The MicroShift certificate manager supports managing TLS certificates. This integration results in the issue, renewal, and management of certificate from certificate authorities.

3.1. MicroShift certificate manager functions

With MicroShift certificate manager, you can complete the following tasks:

  • Automates certificate management: cert-manager creates or updates certificates and detects Kubernetes resources that are annotated with cert-manager.io/kind.
  • Supports multiple CAs: provides flexibility to select one that fits the security and operational needs.
  • Simplifies ingress certificates: cert-manager handles certificates for an ingress controller, which simplifies the configuration and management of secure communication channels.
  • Enhances security: certificate management is automated and the risk of error is reduced. Certificates are current and valid, which contribute to a secure environment.

3.2. Installing and enabling the cert-manager Operator using RPM

The microshift-cert-manager RPM is an optional component that can be installed at any time. Follow these steps to install and verify the certificate manager:

Procedure

  1. Install the cert-manager-operator using the microshift-cert-manager RPM by running the following command:

    $ sudo dnf install microshift-cert-manager
  2. Verify the certificate manager versions that are used by running the following command:

    $ rpm -qi microshift-cert-manager
  3. Restart MicroShift by running the following command:

    $ systemctl microshift restart
  4. Verify that the microshift-cert-manager RPM is installed by running the following command:

    $ oc get deployment -n  cert-manager-operator

    Example output

    NAME                                       READY   UP-TO-DATE   AVAILABLE   AGE
    cert-manager-operator-controller-manager   1/1     1            1           2d22h

  5. Verify that the`cert-manager` deployments are in a ready state and are up-to-date in the cert-manager namespace by running the following command:

    $ oc get deployment -n cert-manager

    Example output

    NAME                      READY   UP-TO-DATE   AVAILABLE   AGE
    cert-manager              1/1     1            1           2d22h
    cert-manager-cainjector   1/1     1            1           2d22h
    cert-manager-webhook      1/1     1            1           2d22h

  6. Verify that the pods are running in the cert-manager namespace by running the following command:

    $ oc get pods -n cert-manager

    Example output

    NAME                                       READY   STATUS    RESTARTS   AGE
    cert-manager-7cfb4fbb84-qdmk8              1/1     Running   2          2d22h
    cert-manager-cainjector-854f669657-xzs8b   1/1     Running   2          2d22h
    cert-manager-webhook-68fd6d5f5c-j942h      1/1     Running   2          2d22h

3.3. Installing and enabling the cert-manager Operator using OLM

You can install the optional microshift-cert-manager by using OLM at any time. For more information, see Using Operator Lifecycle Manager with MicroShift and Installing the cert-manager Operator for Red Hat OpenShift.

Red Hat logoGithubredditYoutubeTwitter

詳細情報

試用、購入および販売

コミュニティー

会社概要

Red Hat は、企業がコアとなるデータセンターからネットワークエッジに至るまで、各種プラットフォームや環境全体で作業を簡素化できるように、強化されたソリューションを提供しています。

多様性を受け入れるオープンソースの強化

Red Hat では、コード、ドキュメント、Web プロパティーにおける配慮に欠ける用語の置き換えに取り組んでいます。このような変更は、段階的に実施される予定です。詳細情報: Red Hat ブログ.

Red Hat ドキュメントについて

Legal Notice

Theme

© 2026 Red Hat
トップに戻る