Update Kubernetes

Tomislav Kopić 2024-05-09 20:13:16 +00:00
parent 05d5e1ea8b
commit 548842d4b0

@ -102,7 +102,7 @@ kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/
By default it will issue fake, self signed certificates , but if your cluster is available directly form the internet you can issue let'sencrypt certs By default it will issue fake, self signed certificates , but if your cluster is available directly form the internet you can issue let'sencrypt certs
so we need to create a file so we need to create a file
``` ```
CapiVersion: cert-manager.io/v1 apiVersion: cert-manager.io/v1
kind: ClusterIssuer kind: ClusterIssuer
metadata: metadata:
name: letsencrypt-prod name: letsencrypt-prod
@ -115,18 +115,14 @@ spec:
solvers: solvers:
- http01: - http01:
ingress: ingress:
class: internal-nginx class: nginx
podTemplate:
spec:
nodeSelector:
"kubernetes.io/os": linux
``` ```
Customize and then apply it: Customize and then apply it:
``` ```
kubectl apply -f file.yml kubectl apply -f file.yml
``` ```
To issue valid certs you will need to add these toingress configs for your services To issue valid certs you will need to add these to ingress configs for your services
``` ```
... ...
@ -205,6 +201,11 @@ kind: Ingress
metadata: metadata:
name: longhorn-ingress name: longhorn-ingress
namespace: longhorn-system namespace: longhorn-system
annotations:
acme.cert-manager.io/http01-edit-in-place: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
ingress.kubernetes.io/ssl-redirect: "False"
kubernetes.io/ingress.class: nginx
spec: spec:
ingressClassName: nginx ingressClassName: nginx
rules: rules:
@ -218,6 +219,10 @@ spec:
name: longhorn-frontend name: longhorn-frontend
port: port:
number: 80 number: 80
tls:
- hosts:
- longhorn.my.cluster.com
secretName: some-name-tls
``` ```
then apply it: then apply it: