-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update documentation on Wildcard Certificates #165
Comments
Hi Remco, It does make sense and it is possible, but maybe not as easy as it should be. There are three install methods, the quick installer, the kustomize install and the Helm installer. I think you used the quick install, which sets a self-signed certificate up for Trow, opens a NodePort in Kubernetes to pass through traffic and adds a route to If you're happy using the Kutomize install, it should be fairly straightforward to modify the Kustomize YAML to configure an ingress point that uses your certificate (you'll need to refer the documentation for whatever ingress implementation you want to use). This is definitely the way to go if you're using Trow in a long-running environment. I've not used the Helm install much personally, so I'm not quite sure how to do it in Helm. If you want to put the certificate on Trow and continue to use NodePort, that should be possible as well, but the quick install isn't set-up to support it as an option. You would need to replace the certificate that's used, changing the domain name that Trow uses and update your DNS to point to Trow. The majority of the quick install is spent dealing with certs and routing, which you don't actually need. So you could dump the YAML for your current trow configuration, put your cert into a secret, modify the YAML to point to it, update the domain name and redeploy Trow using the new YAML. I'll leave this issue open, as we should add some more documentation on using your own certificate, although it might just refer you to ingress docs. |
Thanks Adrian for your positive feedback and fast reply. You explain that I can dump the current trow configuration, so I am going to dive into that one. I am still pretty new on this topic, so lots to learn. Greetz, |
Trow will automatically look for a certificate at Does that help? You will need to update the YAML and replace the current pod. I'll look up how to dump the current config and update this comment later. |
Hi Adrian, Thanks for your feedback and it indeed helped. I am wrapping up what I all did and will then share how I did it in this thread. Maybe it will help you or others later on if a similar question pops up. Will keep you posted. |
Thanks, that would be appreciated. |
Hi @amouat, So I made the following adjustments based on your suggestions/help and I was able to put trow behind our proxy and install/use our own wildcard certificate. I will do my best to describe the additional steps that I've taken to make this work, all based on the quick install you've provided in your package. My goal was to use my own certificate, running trow behind our proxy server and protect it with a username and password. BASIC INSTALL
CREATING A SERVICE AND EXPOSE NODEPORT
ADDING YOUR OWN CERTIFICATE IN KUBERNETES USING A SECRET
ADDING USER + PASSWORD AUTHENTICATION TO TROW
ADJUSTING THE RUNNING DEPLOYMENT
I believe I've covered everything that i've touched, changed. I did my best to describe it as best as I could at this time, feel free to provide any feedback in case something is wrong/unclear. Thanks again for all your help. |
Hi,
We are setting up a trow registry and its working great.
Its using the default self signed certificate incl. the default URL trow.kube-public. All is working fine, but we rather use our own domain. We have the certificate available and I tried to understand the scripts how to push the certificate, but I am simply stuck.
Is this even possible?
I hope above makes sense, if not feel free to respond and I will do my best to give more understanding to my question.
Greetz and thanks,Remco
The text was updated successfully, but these errors were encountered: