Generating custom certificates using cert-manager in a two data center deployment
You can generate custom certificates in a two data center disaster recovery deployment on Kubernetes.
About this task
You can provide your own custom certificates when you deploy IBM API Connect, if required, instead of having the application generate and manage them for you. In most deployment cases to use the built in default Cert-Manager integration is the preferred method.
When you use the custom option, the use of Cert-Manager is the recommended method for generating custom certificates if that fits your business needs. However, use of Cert-Manager is not required, and custom certificates can be generated in any way that suit your needs.
The following example of providing custom certificates uses Cert-Manager as a model for generating them. For generating custom certificates, the minimum supported version of cert-manager is v0.12.
Requirements for deploying to IBM Kubernetes Service:
- Version v0.10.1 of cert-manager is NOT compatible with IBM API Connect when deployed onto the IBM Kubernetes Service (IKS). Do not install cert-manager v0.10.1 into the IKS cluster. Instead, use the steps that follow to install cert-manager v0.12, and create custom certificates for the deployment.
- Do not install the
ingress-ca
Issuer fileingress-issuer-v1.yaml
as described in Deploying operators. Instead, follow the steps that follow to generate a newingress-ca
and custom certificates for the deployment with cert-manager v0.12. - For IKS deployments, generating/providing custom certificates is required for Common Subsystem Communication Certificates, and External Frontend/Ingress certificates. The replacement of Internal Certificates is not required. To review the list of API Connect certificates for which you can generate custom certs, see Configuring custom certificates before installation.