You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The "Cluster" output from the previous command may be the name of your cluster, the internal ID of your cluster, or the cluster's domain prefix. If you prefer to use another identifier, you can manually set this value by running the following command:
Do not attempt to use more than one `cert-manager` Operator in your cluster. If you have a community `cert-manager` Operator installed in your cluster, you must uninstall it before installing the `cert-manager` Operator for Red{nbsp}Hat OpenShift.
184
+
Do not attempt to use more than one cert-manager Operator in your cluster. If you have a community cert-manager Operator installed in your cluster, you must uninstall it before installing the cert-manager Operator for Red{nbsp}Hat OpenShift.
174
185
====
175
186
+
176
-
. Install the `cert-manager` Operator for Red{nbsp}Hat OpenShift:
187
+
. Install the cert-manager Operator for RedHat OpenShift:
177
188
+
178
189
[source,terminal]
179
190
----
@@ -206,7 +217,7 @@ EOF
206
217
It takes a few minutes for this Operator to install and complete its set up.
207
218
====
208
219
+
209
-
. Verify that the `cert-manager` Operator is running:
220
+
. Verify that the cert-manager Operator is running:
It takes a few minutes for this certificate to be issued by Let's Encrypt. If it takes longer than 5 minutes, run `oc -n custom-domain-ingress describe certificate.cert-manager.io/custom-domain-ingress-cert` to see any issues reported by cert-manager.
330
+
It takes a few minutes for this certificate to be issued by Let's Encrypt. If it takes longer than 5 minutes, run `oc -n openshift-ingress describe certificate.cert-manager.io/custom-domain-ingress-cert` to see any issues reported by cert-manager.
327
331
====
328
332
+
329
333
[source,terminal]
330
334
----
331
-
$ oc -n custom-domain-ingress get certificate.cert-manager.io/custom-domain-ingress-cert
335
+
$ oc -n openshift-ingress get certificate.cert-manager.io/custom-domain-ingress-cert
. Create a new `CustomDomain` custom resource (CR):
346
+
. Create a new `IngressController` resource:
343
347
+
344
348
[source,terminal]
345
349
----
346
350
$ cat << EOF | oc apply -f -
347
-
apiVersion: managed.openshift.io/v1alpha1
348
-
kind: CustomDomain
351
+
apiVersion: operator.openshift.io/v1
352
+
kind: IngressController
349
353
metadata:
350
354
name: custom-domain-ingress
355
+
namespace: openshift-ingress-operator
351
356
spec:
352
357
domain: ${DOMAIN}
353
-
scope: External
354
-
loadBalancerType: NLB
355
-
certificate:
358
+
defaultCertificate:
356
359
name: custom-domain-ingress-cert-tls
357
-
namespace: custom-domain-ingress
360
+
endpointPublishingStrategy:
361
+
loadBalancer:
362
+
dnsManagementPolicy: Unmanaged
363
+
providerParameters:
364
+
aws:
365
+
type: NLB
366
+
type: AWS
367
+
scope: External
368
+
type: LoadBalancerService
358
369
EOF
359
370
----
360
-
. Verify that your custom domain Ingress Controller has been deployed and has a `Ready` status:
371
+
+
372
+
[WARNING]
373
+
====
374
+
This `IngressController` example will create an internet accessible Network Load Balancer (NLB) in your AWS account. To provision an internal NLB instead, set the `.spec.endpointPublishingStrategy.loadBalancer.scope` parameter to `Internal` before creating the `IngressController` resource.
375
+
====
376
+
+
377
+
. Verify that your custom domain IngressController has successfully created an external load balancer:
361
378
+
362
379
[source,terminal]
363
380
----
364
-
$ oc get customdomains
381
+
$ oc -n openshift-ingress get service/router-custom-domain-ingress
It takes 2-3 minutes for the certificate to be created. The renewal of the certificate will automatically be managed by the `cert-manager` Operator as it approaches expiration.
524
+
It takes 2-3 minutes for the certificate to be created. The renewal of the certificate will automatically be managed by the cert-manager Operator as it approaches expiration.
508
525
====
509
526
. Verify the certificate for the route is now trusted:
0 commit comments