You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A pod can access the service CA certificate by mounting a `ConfigMap` object that
10
-
is annotated with `service.beta.openshift.io/inject-cabundle=true`.
11
-
Once annotated, the cluster automatically injects the service CA
12
-
certificate into the `service-ca.crt` key on the config map. Access to
13
-
this CA certificate allows TLS clients to verify connections to
14
-
services using service serving certificates.
9
+
A pod can access the service Certificate Authority (CA) certificate by mounting a `ConfigMap` object that has the `service.beta.openshift.io/inject-cabundle=true` annotation. After annotating the config map, the cluster automatically injects the service CA certificate into the `service-ca.crt` key on the config map. Access to this CA certificate allows TLS clients to verify connections to services by using service serving certificates.
15
10
16
11
[IMPORTANT]
17
12
====
18
-
After adding this annotation to a config map all existing data in it is
19
-
deleted. It is recommended to use a separate config map to contain the
20
-
`service-ca.crt`, instead of using the same config map that stores your
21
-
pod configuration.
13
+
After adding this annotation to a config map, the OpenShift Service CA Operator deletes all the data in the config map. Consider using a separate config map to contain the `service-ca.crt`, instead of using the same config map that stores your pod configuration.
22
14
====
23
15
24
16
.Procedure
25
17
26
-
. Annotate the config map with `service.beta.openshift.io/inject-cabundle=true`:
18
+
. Annotate the config map with the `service.beta.openshift.io/inject-cabundle=true` annotation by entering the following command:
Explicitly referencing the `service-ca.crt` key in a volume mount will prevent a pod from starting until the config map has been injected with the CA bundle. This behavior can be overridden by setting the `optional`field to `true`for the volume's serving certificate configuration.
29
+
Explicitly referencing the `service-ca.crt` key in a volume mount prevents a pod from starting until the config map has been injected with the CA bundle. You can override this behavior by setting the `optional`parameter to `true`in the serving certificate configuration of the volume.
38
30
====
39
-
+
40
-
For example, use the following command to annotate the config map `test1`:
0 commit comments