此内容没有您所选择的语言版本。

Chapter 3. Using certificate manager on a MicroShift node


The MicroShift certificate manager supports managing TLS certificates. This integration results in the issue, renewal, and management of certificate from certificate authorities.

3.1. MicroShift certificate manager functions

With MicroShift certificate manager, you can complete the following tasks:

  • Automates certificate management: cert-manager creates or updates certificates and detects Kubernetes resources that are annotated with cert-manager.io/kind.
  • Supports multiple CAs: provides flexibility to select one that fits the security and operational needs.
  • Simplifies ingress certificates: cert-manager handles certificates for an ingress controller, which simplifies the configuration and management of secure communication channels.
  • Enhances security: certificate management is automated and the risk of error is reduced. Certificates are current and valid, which contribute to a secure environment.

The microshift-cert-manager RPM is an optional component that can be installed at any time. Follow these steps to install and verify the certificate manager:

Procedure

  1. Install the cert-manager-operator using the microshift-cert-manager RPM by running the following command:

    $ sudo dnf install microshift-cert-manager
    Copy to Clipboard Toggle word wrap
  2. Verify the certificate manager versions that are used by running the following command:

    $ rpm -qi microshift-cert-manager
    Copy to Clipboard Toggle word wrap
  3. Restart MicroShift by running the following command:

    $ systemctl microshift restart
    Copy to Clipboard Toggle word wrap
  4. Verify that the microshift-cert-manager RPM is installed by running the following command:

    $ oc get deployment -n  cert-manager-operator
    Copy to Clipboard Toggle word wrap

    Example output

    NAME                                       READY   UP-TO-DATE   AVAILABLE   AGE
    cert-manager-operator-controller-manager   1/1     1            1           2d22h
    Copy to Clipboard Toggle word wrap

  5. Verify that the`cert-manager` deployments are in a ready state and are up-to-date in the cert-manager namespace by running the following command:

    $ oc get deployment -n cert-manager
    Copy to Clipboard Toggle word wrap

    Example output

    NAME                      READY   UP-TO-DATE   AVAILABLE   AGE
    cert-manager              1/1     1            1           2d22h
    cert-manager-cainjector   1/1     1            1           2d22h
    cert-manager-webhook      1/1     1            1           2d22h
    Copy to Clipboard Toggle word wrap

  6. Verify that the pods are running in the cert-manager namespace by running the following command:

    $ oc get pods -n cert-manager
    Copy to Clipboard Toggle word wrap

    Example output

    NAME                                       READY   STATUS    RESTARTS   AGE
    cert-manager-7cfb4fbb84-qdmk8              1/1     Running   2          2d22h
    cert-manager-cainjector-854f669657-xzs8b   1/1     Running   2          2d22h
    cert-manager-webhook-68fd6d5f5c-j942h      1/1     Running   2          2d22h
    Copy to Clipboard Toggle word wrap

You can install the optional microshift-cert-manager by using OLM at any time. For more information, see Using Operator Lifecycle Manager with MicroShift and Installing the cert-manager Operator for Red Hat OpenShift.

返回顶部
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2025 Red Hat