Certificates
https://howhttps.works/certificate-authorities/
Once you deploy an application and you get a "Your connection is not secure" with no padlock on the website. That means the certificate from the server is not trusted by the browser (certificate was not issused by a CA authority).
If the application is deployed on Kubernetes, you need to track down where the certificate is located (which pod and the location inside the pod). You can usually find the path / secretName
/ credentialName
in the Ingress
resource or even istio Gateway
resource. Then find the corresponding pods and go to that path to find the certificate
The certificate is most likely self-signed by letsencrypt or another third-party issuer (resource type: ClusterIssuer
). Find out how it is being generated (look for resource Certificate
).
To get a CA authorized certificate, you must go through your cloud provider. For Azure, you have to create a Key Vault and create a signed certificate. For IBM Cloud, if you are using a load balancer, there is a single command to run to obtain a DNS and certificate for that load balancer!
If you are using Azure, export the signed certificate you just created in .pfx
format. Using OpenSSL, you can split this .pfx
file into .crt
and .key
files shown here.
Istio Gateway
https://istio.io/latest/docs/tasks/traffic-management/ingress/secure-ingress/
If you are using istio Gateway
resource, then the file should be something like this:
You can also do it through secrets
Kubernetes Ingress
Last updated