List of internal certificates
A summary of certificates used for communications within subsystems in an API Connect deployment.
Table 1 presents a list of certificates used for microservice-to-microservice communications with
the corresponding secret and affected pods. The certificates in Table 1 must be specified using
cert-manager. The issuer can be any cert-manager issuer (default is
selfsigning-issuer
) using the custom-certs-internal.yaml
template.
Issuer / CA Certificate | Certificate | Usage | Secret | Pods1 |
---|---|---|---|---|
analytics_CR-ca |
analytics_CR-client |
client | analytics_CR-client |
|
analytics_CR-ca |
analytics_CR-server |
server | analytics_CR-server |
|
management_CR-ca |
apicuser |
client | management_CR-db-client-apicuser |
|
management_CR-ca |
management_CR-client |
client | management_CR-client |
|
management_CR-ca |
management_CR-server |
server | management_CR-server |
|
management_CR-ca |
management_CR-random-postgres |
server | management_CR-random-postgres |
|
management_CR-ca |
management_CR-random-postgres-pgbouncer |
server | management_CR-random-postgres-pgbouncer |
|
management_CR-ca |
management_CR-natscluster-mgmt |
clientserver | management_CR-natscluster-mgmt |
natscluster |
management_CR-ca |
pgbouncer |
client | management_CR-db-client-pgbouncer |
|
management_CR-ca |
postgres |
client | management_CR-db-client-postgres |
|
management_CR-ca |
postgres-operator |
server | pgo.tls |
|
management_CR-ca |
replicator |
client | management_CR-db-client-replicator |
|
portal_CR-ca |
portal_CR-client |
client | portal_CR-client |
In a stand-alone, single data center deployment, no restart is needed (pods pick up the new secret and restart any internal processes automatically). In a two data center configuration or a Cloud Pak for Integration deployment, you must restart the pods manually (in both data centers if applicable) within 5-minutes of the update to avoid encountering (recoverable) errors. |
portal_CR-ca |
portal_CR-server |
server | portal_CR-server + dynamically generated server cert for
each portal_CR-db pod |
In a stand-alone, single data center deployment, no restart is needed (pods pick up the new secret and restart any internal processes automatically). In a two data center configuration or a Cloud Pak for Integration deployment, you must restart the pods manually (in both data centers if applicable) within 5-minutes of the update to avoid encountering (recoverable) errors. |