1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

Removed component names

This commit is contained in:
Shubha Narayanan
2025-10-31 17:02:39 +05:30
committed by openshift-cherrypick-robot
parent f9994cad91
commit 2d22a1e135
6 changed files with 222 additions and 0 deletions

View File

@@ -0,0 +1,36 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-nw-policy"]
= Network policy configuration for cert-manager Operator
include::_attributes/common-attributes.adoc[]
:context: cert-manager-nw-policy
toc::[]
The {cert-manager-operator} provides predefined `NetworkPolicy` resources to enhance security by controlling the ingress and egress traffic for its components. By default, this feature is disabled to prevent connectivity issues or breaking changes during an upgrade. To use this feature, you must enable it in the `CertManager` custom resource (CR).
After enabling the default policies, you must manually configure additional egress rules to allow outbound traffic. These rules are required for {cert-manager-operator} to communicate with external services beyond the API server and internal DNS.
The examples of services that require custom egress rules include the following:
* ACME servers, for example, Let's Encrypt
* DNS-01 challenge providers, for example, AWS Route53 or Cloudflare
* External CAs, such as HashiCorp Vault
[NOTE]
====
Network policies are expected to be enabled by default in a future release, which could cause connectivity failures during an upgrade. To prepare for this change, configure the required egress policies.
====
// Egress and ingress rules
include::modules/cert-manager-nw-policy-rules.adoc[leveloffset=+1]
//Network policy parameters
include::modules/cert-manager-nw-policy-params.adoc[leveloffset=+1]
//Network policy examples
include::modules/cert-manager-nw-policy-examples.adoc[leveloffset=+1]
//Verification
include::modules/cert-manager-nw-policy-verify.adoc[leveloffset=+1]