There are two ways to add a Certificate Authority (CA) bundle to {productname-short}. You can use one or both of these methods:
-
For {openshift-platform} clusters that rely on self-signed certificates, you can add those self-signed certificates to a cluster-wide Certificate Authority (CA) bundle (
ca-bundle.crt
) and use the CA bundle in {productname-long}. -
You can use self-signed certificates in a custom CA bundle (
odh-ca-bundle.crt
) that is separate from the cluster-wide bundle.
-
You have admin access to the
DSCInitialization
resources in the {openshift-platform} cluster. -
You installed the OpenShift command line interface (
oc
) as described in Installing the OpenShift CLI.
-
Log in to the {openshift-platform} as a cluster administrator.
-
Click Operators → Installed Operators and then click the {productname-long} Operator.
-
Click the DSC Initialization tab.
-
Click the default-dsci object.
-
Click the YAML tab.
-
Add the following to the
spec
section, setting themanagementState
field toManaged
:spec: trustedCABundle: managementState: Managed customCABundle: ""
-
If you want to use self-signed certificates added to a cluster-wide CA bundle, log in to the {openshift-platform} as a cluster administrator and follow the steps as described in Configuring the cluster-wide proxy during installation.
-
If you want to use self-signed certificates in a custom CA bundle that is separate from the cluster-wide bundle, follow these steps:
-
Add the custom certificate to the
customCABundle
field of thedefault-dsci
object, as shown in the following example:spec: trustedCABundle: managementState: Managed customCABundle: | -----BEGIN CERTIFICATE----- examplebundle123 -----END CERTIFICATE-----
-
Click Save.
The {productname-long} Operator creates an
odh-trusted-ca-bundle
ConfigMap containing the certificates in all new and existing non-reserved namespaces.
-
-
If you are using a cluster-wide CA bundle, run the following command to verify that all non-reserved namespaces contain the
odh-trusted-ca-bundle
ConfigMap:$ oc get configmaps --all-namespaces -l app.kubernetes.io/part-of=opendatahub-operator | grep odh-trusted-ca-bundle
-
If you are using a custom CA bundle, run the following command to verify that a non-reserved namespace contains the
odh-trusted-ca-bundle
ConfigMap and that the ConfigMap contains yourcustomCABundle
value. In the following command, example-namespace is the non-reserved namespace and examplebundle123 is the customCABundle value.$ oc get configmap odh-trusted-ca-bundle -n example-namespace -o yaml | grep examplebundle123