You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2-1. In cluster mode (IC Pod) : with a Kubernetes Secret
315
+
316
+
The recommanded way of using a folder (or a filename) is to mount a secret volume like below in the Ingress Controller Pod (it's possible to use `extraVolumes` and `extraVolumeMounts` in the Helm Charts):
317
+
318
+
```
319
+
spec:
320
+
template:
321
+
spec:
322
+
containers:
323
+
...
324
+
volumeMounts:
325
+
- mountPath: "/var/certs"
326
+
name: certs
327
+
readOnly: true
328
+
volumes:
329
+
- name: certs
330
+
secret:
331
+
secretName: tcp-test-cert
332
+
```
333
+
334
+
In the TCP CR, reference the volume mount path in `ssl_certificate`:
335
+
```
336
+
ssl_certificate: /var/certs
337
+
```
338
+
339
+
**Note that storing the certificates in the Pod image and using for `ssl_certificate` a path to it, is NOT recommanded.**
340
+
341
+
342
+
2-2. External mode
343
+
344
+
Using as `ssl_certificate` with a Kubernetes Secret name as presented above in 1- also works in external mode.
345
+
It's also possibe to use a folder/filename in `external mode`, store the certificates there and reference this path as `ssl_certificate`.
295
346
296
-
It's for example possible to mount a SSL Secret in the Ingress Controller Pod on a volume and reference the volume mount path in `ssl_certificate`.
297
-
Without change the Pod (/deployment manifest), you can use a Secret name in `ssl_certificate`.
298
-
Then the cert + key will be written in the Pod filesystem in:
0 commit comments