You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: en/docs/setup/production-deployment-guideline.md
+33-19
Original file line number
Diff line number
Diff line change
@@ -48,9 +48,14 @@ For a production environment, it is recommended to use CA-validated public certi
48
48
| Gateway server |`<helm-installation-name>-gateway-service.<namespace-name>.svc`, `<helm-installation-name>-gateway-service.<namespace-name>.svc.cluster.local`|
49
49
| Ratelimitter server |`<helm-installation-name>-ratelimiter-service.<namespace-name>.svc`, `<helm-installation-name>-ratelimiter-service.<namespace-name>.svc.cluster.local`|
50
50
51
-
### 1. Use certmanager
51
+
### 1: Use cert-manager
52
52
53
-
By default, Kubernetes Gateway installs cert manager in your cluster and employs a SelfSigned issuer for certificate validations. To utilize cert manager for handling the certificates, you will need to create [Issuers](https://cert-manager.io/docs/configuration/). Choose the type of Issuer you are going to use for listeners and servers, and create the Issuers in accordance with the [cert-manager documentation](https://cert-manager.io/docs/configuration/) document. You will need to create two issuers: one for listeners and one for servers.
53
+
!!! note
54
+
This will install cert-manager **within the namespace APK is installed in**. If you already have a cert-manager installation, or you wish to install cert-manager in a different namespace, follow the steps provided in
55
+
56
+
By default, the Kubernetes Gateway helm installation installs-cert manager in your cluster and employs a SelfSigned ClusterIssuer for certificate validations. To utilize cert manager for handling the certificates, you will need to create **Issuers**.
57
+
58
+
Choose the type of Issuer you are going to use for listeners and servers, and create them in accordance with the <ahref="https://cert-manager.io/docs/configuration/"target="_blank">official cert-manager documentation</a>. You will need to create two Issuers: one for listeners and one for servers.
54
59
55
60
Once created, update the values.yaml configuration as follows. This configuration is to be placed at the same indentation level as the `wso2` configuration in the values.yaml file.
56
61
@@ -60,36 +65,45 @@ wso2:
60
65
certmanager:
61
66
listeners:
62
67
issuerName: "<issuer-name-created-for-listeners>"
63
-
issuerKind: "ClusterIssuer"# or "Issuer" Refer to cert-manager's issuer doc
64
-
servers:
68
+
issuerKind: "ClusterIssuer"# or "Issuer"
69
+
servers:
65
70
issuerName: "<issuer-name-created-for-servers>"
66
-
issuerKind: "ClusterIssuer"# or "Issuer" Refer to cert-manager's issuer doc
71
+
issuerKind: "ClusterIssuer"# or "Issuer"
67
72
```
68
73
69
-
### 2. Use the certificate files
74
+
### 2: Create the secrets
70
75
71
-
<b>Prerequisites</b>
76
+
#### Prerequisites
72
77
73
-
For all the components(Listeners and servers) prepare the following required files.
78
+
##### 1. Generate the necessary certificate information
79
+
For all the components (listeners and servers), prepare the following information.
74
80
75
-
1. TLS certificate verified by a Ceriticate Authority (tls.crt)
76
-
2. Private key associated with the TLS certificate(tls.key)
0 commit comments