Creating a secret to store shared custom certificates
You can create a secret called cpd-custom-ca-certs that
contains a set of custom certificates. You can run the gen-platform-ca-certs to inject the secret, the secret mount, and
associated environment variables into IBM Software Hub
pods so that they have access to the custom certificates.
- Who needs to complete this task?
-
To complete this task, you must have one of the following roles:
- Cluster administrator
- Instance administrator
- When do you need to complete this task?
-
Complete this task if you want to use a set of shared custom certificates across multiple services.
The following services support shared custom certificates:
- AI Factsheets
- Analytics Engine powered by Apache Spark
- Cognos Analytics
- Data Privacy
- DataStage
- Data Virtualization
- Db2 Big SQL
- IBM Match 360
- OpenPages
- RStudio®
- Watson Studio
- Watson Studio Runtimes
- watsonx Assistant
- watsonx.data™
- watsonx™ Orchestrate
If you have multiple instances of IBM Software Hub on the cluster, you must complete this task for each instance where you want to use shared custom certificates.
Before you begin
A cluster administrator must install and enable the IBM Software Hub configuration admission controller webhook.
- Check whether the configuration admission controller webhook is installed:
oc get mutatingwebhookconfiguration -n ${PROJECT_CPD_INST_OPERANDS} | grep cpd-config-ac-webhook-cfg- If the webhook is installed, the command returns output with the following
format:
cpd-config-ac-webhook-cfg-<project-name> 1 28d5h - If the webhook is not installed, the command returns an empty response. For more information, see Installing the IBM Software Hub configuration admission controller webhook.
- If the webhook is installed, the command returns output with the following
format:
- Check whether the configuration admission controller webhook is enabled:
oc get namespace ${PROJECT_CPD_INST_OPERANDS} --show-labels | grep cpd-config-ac-${PROJECT_CPD_INST_OPERANDS}=enabled --col- If the webhook is enabled, the command returns output with the following
format:
<project-name> Active 28d cpd-config-ac-<project-name>=enabled,kubernetes.io/metadata.name=<project-name>,... - If the webhook is not enabled, the command returns an empty response. For more information, see Installing the IBM Software Hub configuration admission controller webhook.
- If the webhook is enabled, the command returns output with the following
format:
About this task
The IBM Software Hub configuration
admission controller is a mutating webhook that injects the cpd-custom-ca-certs secret, the secret mount, and the associated environment variables
into IBM Software Hub pods so that they have access
to a shared set of custom certificates.
You must create a secret called cpd-custom-ca-certs that
contains your custom certificates. After you create the cpd-custom-ca-certs secret, run the gen-platform-ca-certs command
to:
- Update the
cpd-custom-ca-certssecret with the contents custom certificates. - Inject the contents of the
cpd-custom-ca-certssecret into IBM Software Hub pods.