
Changed name of file to: admin-application-commands-and-helm-overrides.rst Updated Strings.txt Updated formatting issues: installing-and-running-cpu-manager-for-kubernetes.rst Updated Patch Set 4 to include review comments Admin Tasks Updated Changed name of include file to: isolating-cpu-cores-to-enhance-application-performance.rest Change-Id: I0b354dda3c7f66da3a5d430839b5007a6a19cfad Signed-off-by: Juanita-Balaraj <juanita.balaraj@windriver.com> Signed-off-by: Stone <ronald.stone@windriver.com> Signed-off-by: Juanita-Balaraj <juanita.balaraj@windriver.com>
2.7 KiB
Install/Update the Docker Registry Certificate
The local Docker registry provides secure HTTPS access using the registry API.
By default a self-signed certificate is generated at installation time for the registry API. For more secure access, a Root CA-signed certificate is strongly recommended.
The Root CA-signed certificate for the registry must have at least
the following : DNS:registry.local,DNS:registry.central,
IP Address:<oam-floating-ip-address>, IP
Address:<mgmt-floating-ip-address>. Use the system addrpool-list
command to get the floating IP Address and management floating IP
Address for your system. You can add any additional DNS entry(s) that
you have set up for your OAM floating IP Address.
Use the following procedure to install a Root CA-signed certificate to either replace the default self-signed certificate or to replace an expired or soon to expire certificate.
Obtain a Root CA-signed certificate and key from a trusted Root Certificate Authority (CA). Refer to the documentation for the external Root CA that you are using, on how to create public certificate and private key pairs, signed by a Root CA, for HTTPS.
Put the Privacy Enhanced Mail (PEM) encoded versions of the certificate and key in a single file, and copy the file to the controller host.
Also obtain the certificate of the Root CA that signed the above certificate.
In order to enable internal use of the Docker registry certificate, update the trusted CA list for this system with the Root CA associated with the Docker registry certificate.
~(keystone_admin)$ system certificate-install --mode ssl_ca <pathTocertificate>
where:
<pathTocertificate>
is the path to the Root CA certificate associated with the Docker registry Root CA-signed certificate.
Update the Docker registry certificate using the
certificate-install
command.Set the mode (
-m
or--mode
) parameter to docker_registry.~(keystone_admin)$ system certificate-install --mode docker_registry <pathTocertificateAndKey>
where:
<pathTocertificateAndKey>
is the path to the file containing both the Docker registry certificate and private key to install.