1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

cert-manager content improvement

This commit is contained in:
Shubha Narayanan
2024-02-01 15:28:24 +05:30
committed by openshift-cherrypick-robot
parent 01a4fef699
commit c36a127778
19 changed files with 214 additions and 93 deletions

View File

@@ -1113,22 +1113,16 @@ Topics:
File: cert-manager-operator-issuer-acme
- Name: Configuring certificates with an issuer
File: cert-manager-creating-certificate
- Name: Enabling monitoring for the cert-manager Operator for Red Hat OpenShift
- Name: Monitoring the cert-manager Operator for Red Hat OpenShift
File: cert-manager-monitoring
- Name: Configuring the egress proxy for the cert-manager Operator for Red Hat OpenShift
- Name: Configuring the egress proxy
File: cert-manager-operator-proxy
- Name: Customizing cert-manager by using the cert-manager Operator API fields
File: cert-manager-customizing-api-fields
- Name: Authenticating the cert-manager Operator with AWS Security Token Service
File: cert-manager-authenticate-aws
- Name: Authenticating the cert-manager Operator for Red Hat OpenShift
File: cert-manager-authenticate
- Name: Configuring log levels for cert-manager and the cert-manager Operator for Red Hat OpenShift
File: cert-manager-log-levels
- Name: Authenticating the cert-manager Operator for Red Hat OpenShift with GCP Workload Identity
File: cert-manager-authenticate-gcp
- Name: Authenticating the cert-manager Operator for Red Hat OpenShift on AWS
File: cert-manager-authentication-non-sts
- Name: Authenticating the cert-manager Operator for Red Hat OpenShift on GCP
File: cert-manager-authenticate-non-sts-gcp
- Name: Uninstalling the cert-manager Operator for Red Hat OpenShift
File: cert-manager-operator-uninstall
- Name: Viewing audit logs

View File

@@ -1,12 +1,10 @@
// Module included in the following assemblies:
//
// * security/cert_manager_operator/cert-manager-authenticate-aws.adoc
// * security/cert_manager_operator/cert-manager-authenticate.adoc
:_mod-docs-content-type: PROCEDURE
[id="cert-manager-configure-cloud-credentials-aws-non-sts_{context}"]
= Configuring cloud credentials for the {cert-manager-operator} on AWS
To configure the cloud credentials for the {cert-manager-operator} on the AWS cluster you must generate the cloud credentials secret by creating a `CredentialsRequest` object, and allowing the Cloud Credential Operator.
= Authenticating on AWS
.Prerequisites

View File

@@ -1,12 +1,10 @@
// Module included in the following assemblies:
//
// * security/cert_manager_operator/cert-manager-authenticate-aws.adoc
// * security/cert_manager_operator/cert-manager-authenticate.adoc
:_mod-docs-content-type: PROCEDURE
[id="cert-manager-configure-cloud-credentials-aws-sts_{context}"]
= Configuring cloud credentials for the {cert-manager-operator} for the AWS Security Token Service cluster
To configure the cloud credentials for the {cert-manager-operator} on the AWS Security Token Service (STS) cluster with the cloud credentials. You must generate the cloud credentials manually, and apply it on the cluster by using the `ccoctl` binary.
= Authenticating with AWS Security Token Service
.Prerequisites

View File

@@ -1,12 +1,10 @@
// Module included in the following assemblies:
//
// * security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc
// * security/cert_manager_operator/cert-manager-authenticate.adoc
:_mod-docs-content-type: PROCEDURE
[id="cert-manager-configure-cloud-credentials-gcp-non-sts_{context}"]
= Configuring cloud credentials for the {cert-manager-operator} on GCP
To configure the cloud credentials for the {cert-manager-operator} on a GCP cluster you must create a `CredentialsRequest` object, and allow the Cloud Credential Operator to generate the cloud credentials secret.
= Authenticating on GCP
.Prerequisites

View File

@@ -1,12 +1,10 @@
// Module included in the following assemblies:
//
// * security/cert_manager_operator/cert-manager-authenticate-gcp.adoc
// * security/cert_manager_operator/cert-manager-authenticate.adoc
:_mod-docs-content-type: PROCEDURE
[id="cert-manager-configure-cloud-credentials-gcp-sts_{context}"]
= Configuring cloud credentials for the {cert-manager-operator} with GCP Workload Identity
Generate the cloud credentials for the {cert-manager-operator} by using the `ccoctl` binary. Then, apply them to the GCP Workload Identity cluster.
= Authenticating with GCP Workload Identity
.Prerequisites

View File

@@ -30,9 +30,9 @@ apiVersion: operator.openshift.io/v1alpha1
kind: CertManager
...
spec:
logLevel: Normal <1>
logLevel: <log_level> <1>
----
<1> The default `logLevel` is `Normal`. Replace `Normal` with the desired log level value. The valid log level values for the `CertManager` resource are `Normal`, `Debug`, `Trace`, and `TraceAll`. To audit logs and perform common operations when everything is fine, set `logLevel` to `Normal` . To troubleshoot a minor issue by viewing verbose logs, set `logLevel` to `Debug` . To troubleshoot a major issue by viewing more verbose logs, you can set `logLevel` to `Trace`. To troubleshoot serious issues, set `logLevel` to `TraceAll`.
<1> The valid log level values for the `CertManager` resource are `Normal`, `Debug`, `Trace`, and `TraceAll`. To audit logs and perform common operations when there are no issues, set `logLevel` to `Normal` . To troubleshoot a minor issue by viewing verbose logs, set `logLevel` to `Debug` . To troubleshoot a major issue by viewing more verbose logs, you can set `logLevel` to `Trace`. To troubleshoot serious issues, set `logLevel` to `TraceAll`. The default `logLevel` is `Normal`.
+
[NOTE]
====

View File

@@ -0,0 +1,130 @@
// Module included in the following assemblies:
//
// * security/cert_manager_operator/cert-manager-operator-install.adoc
:_mod-docs-content-type: PROCEDURE
[id="cert-manager-install-cli_{context}"]
= Installing the {cert-manager-operator} by using the CLI
.Prerequisites
* You have access to the cluster with `cluster-admin` privileges.
.Procedure
. Create a new project named `cert-manager-operator` by running the following command:
+
[source, terminal]
----
$ oc new-project cert-manager-operator
----
. Create an `OperatorGroup` object:
.. Create a YAML file, for example, `operatorGroup.yaml`, with the following content:
+
[source, yaml]
----
apiVersion: operators.coreos.com/v1
kind: OperatorGroup
metadata:
name: openshift-cert-manager-operator
namespace: cert-manager-operator
spec:
targetNamespaces:
- "cert-manager-operator"
----
.. Create the `OperatorGroup` object by running the following command:
+
[source, terminal]
----
$ oc create -f operatorGroup.yaml
----
. Create a `Subscription` object:
.. Create a YAML file, for example, `subscription.yaml`, that defines the `Subscription` object:
+
[source, yaml]
----
apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
name: openshift-cert-manager-operator
namespace: cert-manager-operator
spec:
channel: stable-v1
name: openshift-cert-manager-operator
source: redhat-operators
sourceNamespace: openshift-marketplace
installPlanApproval: Automatic
startingCSV: cert-manager-operator.v1.13.0
----
.. Create the `Subscription` object by running the following command:
+
[source, terminal]
----
$ oc create -f subscription.yaml
----
.Verification
. Verify that the OLM subscription is created by running the following command:
+
[source, terminal]
----
$ oc get subscription -n cert-manager-operator
----
+
.Example output
[source, terminal]
----
NAME PACKAGE SOURCE CHANNEL
openshift-cert-manager-operator openshift-cert-manager-operator redhat-operators stable-v1
----
. Verify whether the Operator is successfully installed by running the following command:
+
[source, terminal]
----
$ oc get csv -n cert-manager-operator
----
+
.Example output
[source, terminal]
----
NAME DISPLAY VERSION REPLACES PHASE
cert-manager-operator.v1.13.0 cert-manager Operator for Red Hat OpenShift 1.13.0 cert-manager-operator.v1.12.1 Succeeded
----
. Verify that the status {cert-manager-operator} is `Running` by running the following command:
+
[source, terminal]
----
$ oc get pods -n cert-manager-operator
----
+
.Example output
[source, terminal]
----
NAME READY STATUS RESTARTS AGE
cert-manager-operator-controller-manager-695b4d46cb-r4hld 2/2 Running 0 7m4s
----
. Verify that the status of cert-manager pods is `Running` by running the following command:
+
[source, terminal]
----
$ oc get pods -n cert-manager
----
+
.Example output
[source, terminal]
----
NAME READY STATUS RESTARTS AGE
cert-manager-58b7f649c4-dp6l4 1/1 Running 0 7m1s
cert-manager-cainjector-5565b8f897-gx25h 1/1 Running 0 7m37s
cert-manager-webhook-9bc98cbdd-f972x 1/1 Running 0 7m40s
----

View File

@@ -4,7 +4,7 @@
:_mod-docs-content-type: PROCEDURE
[id="cert-manager-install-console_{context}"]
= Installing the {cert-manager-operator} using the web console
= Installing the {cert-manager-operator} by using the web console
You can use the web console to install the {cert-manager-operator}.
@@ -21,11 +21,13 @@ You can use the web console to install the {cert-manager-operator}.
. Enter *{cert-manager-operator}* into the filter box.
. Select the *{cert-manager-operator}* and click *Install*.
. Select the *{cert-manager-operator}*
. Select the {cert-manager-operator} version from *Version* drop-down list, and click *Install*.
+
[NOTE]
====
From the {cert-manager-operator} `1.12.0` and later, the z-stream versions of the upstream cert-manager operands such as cert-manager controller, CA injector, Webhook, and {cert-manager-operator} are decoupled. For example, for the {cert-manager-operator} `1.12.0`, the cert-manager operand version is `v1.12.4`.
See supported {cert-manager-operator} versions in the following "Additional resources" section.
====
. On the *Install Operator* page:

View File

@@ -0,0 +1,10 @@
// Module included in the following assemblies:
//
// * security/cert_manager_operator/index.adoc
:_mod-docs-content-type: REFERENCE
[id="cert-manager-operator-supported-versions_{context}"]
== Supported {cert-manager-operator} versions
{product-title} {product-version} supports the following versions of {cert-manager-operator}:
* {cert-manager-operator} 1.13

View File

@@ -1,16 +0,0 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-authenticate-aws"]
= Authenticating the {cert-manager-operator} with AWS Security Token Service
include::_attributes/common-attributes.adoc[]
:context: cert-manager-authenticate-aws
toc::[]
You can authenticate the {cert-manager-operator} on the AWS Security Token Service (STS) cluster. You can configure cloud credentials for the {cert-manager-operator} by using the `ccoctl` binary.
include::modules/cert-manager-configure-cloud-credentials-aws-sts.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="additional-resources_cert-manager-authenticate-gcp"]
== Additional resources
* xref:../../installing/installing_aws/installing-aws-customizations.adoc#cco-ccoctl-configuring_installing-aws-customizations[Configuring the Cloud Credential Operator utility]

View File

@@ -1,16 +0,0 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-authenticate-gcp"]
= Authenticating the {cert-manager-operator} with GCP Workload Identity
include::_attributes/common-attributes.adoc[]
:context: cert-manager-authenticate-gcp
toc::[]
You can authenticate the {cert-manager-operator} on the GCP Workload Identity cluster by using the cloud credentials. You can configure the cloud credentials by using the `ccoctl` binary.
include::modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="additional-resources_cert-manager-authenticate-gcp-workload-identity"]
== Additional resources
* xref:../../installing/installing_gcp/installing-gcp-customizations.adoc#cco-ccoctl-configuring_installing-gcp-customizations[Configuring the Cloud Credential Operator utility]

View File

@@ -1,11 +0,0 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-authenticate-non-sts-gcp"]
= Authenticating the {cert-manager-operator} on GCP
include::_attributes/common-attributes.adoc[]
:context: cert-manager-authenticate-non-sts-gcp
toc::[]
You can configure cloud credentials for the {cert-manager-operator} on a GCP cluster. The cloud credentials are generated by the Cloud Credential Operator.
include::modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc[leveloffset=+1]

View File

@@ -0,0 +1,37 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-authenticate-aws"]
= Authenticating the {cert-manager-operator}
include::_attributes/common-attributes.adoc[]
:context: cert-manager-authenticate
toc::[]
You can authenticate the cert-manager Operator for Red Hat OpenShift on the cluster by configuring the cloud credentials.
// on AWS
include::modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc[leveloffset=+1]
// with AWS Security Token Service
include::modules/cert-manager-configure-cloud-credentials-aws-sts.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="additional-resources_cert-manager-authenticate-gcp"]
.Additional resources
* xref:../../installing/installing_aws/installing-aws-customizations.adoc#cco-ccoctl-configuring_installing-aws-customizations[Configuring the Cloud Credential Operator utility]
// on GCP
include::modules/cert-manager-configure-cloud-credentials-gcp-non-sts.adoc[leveloffset=+1]
// with GCP Workload Identity
include::modules/cert-manager-configure-cloud-credentials-gcp-sts.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="additional-resources_cert-manager-authenticate-gcp-workload-identity"]
.Additional resources
* xref:../../installing/installing_gcp/installing-gcp-customizations.adoc#cco-ccoctl-configuring_installing-gcp-customizations[Configuring the Cloud Credential Operator utility]
* xref:../../authentication/managing_cloud_provider_credentials/cco-short-term-creds.adoc#cco-short-term-creds[Manual mode with short-term credentials for components]
* xref:../../authentication/managing_cloud_provider_credentials/about-cloud-credential-operator.adoc#about-cloud-credential-operator-default_about-cloud-credential-operator[Default behavior of the Cloud Credential Operator]

View File

@@ -1,11 +0,0 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-authentication-non-sts"]
= Authenticating the {cert-manager-operator} on AWS
include::_attributes/common-attributes.adoc[]
:context: cert-manager-authentication-non-sts
toc::[]
You can configure the cloud credentials for the {cert-manager-operator} on the AWS cluster. The cloud credentials are generated by the Cloud Credential Operator.
include::modules/cert-manager-configure-cloud-credentials-aws-non-sts.adoc[leveloffset=+1]

View File

@@ -1,6 +1,6 @@
:_mod-docs-content-type: ASSEMBLY
[id="cert-manager-monitoring"]
= Enabling monitoring for the {cert-manager-operator}
= Monitoring {cert-manager-operator}
include::_attributes/common-attributes.adoc[]
:context: cert-manager-monitoring

View File

@@ -8,8 +8,16 @@ toc::[]
The {cert-manager-operator} is not installed in {product-title} by default. You can install the {cert-manager-operator} by using the web console.
== Installing the {cert-manager-operator}
// Installing the {cert-manager-operator} using the web console
include::modules/cert-manager-install-console.adoc[leveloffset=+1]
include::modules/cert-manager-install-console.adoc[leveloffset=+2]
//Installing using CLI
include::modules/cert-manager-install-cli.adoc[leveloffset=+2]
[role="_additional-resources"]
.Additional resources
* xref:../cert_manager_operator/index.adoc#cert-manager-operator-supported-versions_cert-manager-operator-about[Supported {cert-manager-operator} versions]
// Updating paths for the {cert-manager-operator}
include::modules/cert-manager-operator-update-channels.adoc[leveloffset=+1]

View File

@@ -61,10 +61,10 @@ include::modules/cert-manager-acme-dns01-explicit-azure.adoc[leveloffset=+1]
[id="additional-resources_cert-manager-operator-issuer-acme"]
== Additional resources
* xref:../../security/cert_manager_operator/cert-manager-authenticate-aws.adoc#cert-manager-configure-cloud-credentials-aws-sts_cert-manager-authenticate-aws[Configuring cloud credentials for the {cert-manager-operator} for the AWS Security Token Service cluster]
* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-aws-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} for the AWS Security Token Service cluster]
* xref:../../security/cert_manager_operator/cert-manager-authentication-non-sts.adoc#cert-manager-configure-cloud-credentials-aws-non-sts_cert-manager-authentication-non-sts[Configuring cloud credentials for the {cert-manager-operator} on AWS]
* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-aws-non-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} on AWS]
* xref:../../security/cert_manager_operator/cert-manager-authenticate-gcp.adoc#cert-manager-configure-cloud-credentials-gcp-sts_cert-manager-authenticate-gcp[Configuring cloud credentials for the {cert-manager-operator} with GCP Workload Identity]
* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-gcp-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} with GCP Workload Identity]
* xref:../../security/cert_manager_operator/cert-manager-authenticate-non-sts-gcp.adoc#cert-manager-configure-cloud-credentials-gcp-non-sts_cert-manager-authenticate-non-sts-gcp[Configuring cloud credentials for the {cert-manager-operator} on GCP]
* xref:../../security/cert_manager_operator/cert-manager-authenticate.adoc#cert-manager-configure-cloud-credentials-gcp-non-sts_cert-manager-authenticate[Configuring cloud credentials for the {cert-manager-operator} on GCP]

View File

@@ -4,8 +4,6 @@
include::_attributes/common-attributes.adoc[]
:context: cert-manager-operator-proxy
toc::[]
If a cluster-wide egress proxy is configured in {product-title}, Operator Lifecycle Manager (OLM) automatically configures Operators that it manages with the cluster-wide proxy. OLM automatically updates all of the Operator's deployments with the `HTTP_PROXY`, `HTTPS_PROXY`, `NO_PROXY` environment variables.
You can inject any CA certificates that are required for proxying HTTPS connections into the {cert-manager-operator}.

View File

@@ -17,6 +17,10 @@ include::modules/cert-manager-issuer-types.adoc[leveloffset=+1]
// Certificate request methods
include::modules/cert-manager-request-methods.adoc[leveloffset=+1]
//Supported versions
include::modules/cert-manager-supported-versions.adoc[leveloffset=+1]
[role="_additional-resources"]
[id="cert-manager-operator-about_additional-resources"]
== Additional resources