File tree 1 file changed +15
-0
lines changed
1 file changed +15
-0
lines changed Original file line number Diff line number Diff line change @@ -116,6 +116,21 @@ Pull Secrets] for more information.
116
116
See link:builds.html#using-private-repositories-for-builds[Using Private
117
117
Repositories for Builds] for more information.
118
118
119
+ [[service-serving-certificate-secrets]]
120
+ === Service Serving Certificate Secrets
121
+
122
+ To secure communication to your service, you can have the cluster generate a signed
123
+ serving certificate/key pair into a secret in your namespace. To do this, set the
124
+ "*service.alpha.openshift.io/serving-cert-secret-name*" to the name you want to use
125
+ for your secret. Your PodSpec can then mount that secret and when it is available
126
+ your pod will run. The certificate will be good for the internal service DNS name:
127
+ `*<service.name>.<service.namespace>.svc*`. The certificate and key are in PEM format,
128
+ stored in `*tls.crt*` and `*tls.key*` respectively.
129
+
130
+ Other pods can trust cluster-created certificates (which are only signed for internal
131
+ DNS names), by using the CA bundle in the `*/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt*`
132
+ file that is automatically mounted in their pod.
133
+
119
134
[[secrets-restrictions]]
120
135
== Restrictions
121
136
You can’t perform that action at this time.
0 commit comments