This topic tells you how to use the certificate information from your external certificate authority to encrypt inbound traffic to Tanzu Developer Portal.
Your certificate authority gave you a certificate file, of the form CERTIFICATE-FILE-NAME.crt
, and
a signing key, of the form KEY-FILE-NAME.key
.
Ensure that these files are present on the host from which you run the CLI commands.
To configure Tanzu Developer Portal with an existing certificate:
-
Create the Kubernetes secret by running:
kubectl create secret tls tap-gui-cert --key="KEY-FILE-NAME.key" --cert="CERTIFICATE-FILE-NAME.crt" -n tap-gui
Where:
KEY-FILE-NAME
is the name of thekey
file that your certificate issuer gave youCERTIFICATE-FILE-NAME
is the name of thecrt
file that your certificate issuer gave you
-
Configure Tanzu Developer Portal to use the newly created secret. Do so by editing the
tap-values.yaml
file that you used during installation to include the following under thetap-gui
section:- A top-level
tls
key with subkeys fornamespace
andsecretName
- A namespace referring to the namespace used earlier
- A secret name referring to the
secretName
value defined earlier
Example:
tap_gui: tls: namespace: tap-gui secretName: tap-gui-cert # Additional configuration below this line as needed
- A top-level
-
Update the Tanzu Application Platform package with the new values in
tap-values.yaml
by running:tanzu package installed update tap -p tap.tanzu.vmware.com -v TAP-VERSION --values-file tap-values.yaml -n tap-install
Where
TAP-VERSION
is the version number that matches the values you used when you installed your profile.