Configuring TLS encryption with a custom certificate on IBM Cloud Private
The proxy requires a public certificate and private key pair to be supplied through a
Kubernetes secret called {{ .Release.Name }}-proxy-tls-secret. If you want to use a
custom certificate, for example, one signed by your own public key infrastructure Certificate
Authority (CA), create your own proxy secret, containing the public certificate and private key
pair, before deployment. To enable a successful Transport Layer Security (TLS) handshake, import the
CA signer certificate into the keystore of any client application as a trusted source.
Before deploying Operations Management on IBM Cloud Private, you can create your own certificate key pair and create the proxy TLS secret by completing the following steps:
|Follow this procedure when the public certificate and private key have already been created and signed by an external CA. When creating the certificate, it is important to ensure that the subject Common Name (CN) field matches the following format:
proxy.{{ .Release.Name }}.{{global.cluster.fqdn}}Where
{{ .Release.Name }} is the name of the Helm release and
{{global.cluster.fqdn}} is the fully qualified domain name (FQDN) of the
cluster's master node. For more information about the FQDN, see Master
node.