|
Important
|
When Domino deploys Istio mesh, out of the box, Istio provides scalable identity and X.509 certificate management for use with mTLS encryption, including periodic certificate and key rotation. Because all encrypted communication is internal, Domino acknowledges that enterprise policies might mandate the use of corporate public key infrastructure (PKI) and necessitate the use of certificate authority (CA) certificates. |
|
Note
|
|
-
Obtain the certificate files, noting the file names for use in future commands.
Filename Description root-cert.pemRoot CA certificate for PKI.
ca-cert.pemIntermediate CA certificate from root CA. This is the Istio CA certificate.
ca-key.pemPrivate key for Istio CA certificate.
cert-chain.pemFull chain from
ca-cert.pemtoroot-cert.pem(including both certificates). -
Use the code in the following sample.
# Concatenate all certificates into a certificate chain file # Assuming `N` intermediate certificates denoted as `int-ca-<i>.pem`, with `i = {1,...,N}` cat ca-cert.pem int-ca-1.pem ... int-ca-N.pem root-cert.pem > cert-chain.pem # Create new kubernetes secret with CA certificate files kubectl -n istio-system create secret generic cacerts --from-file=./ca-cert.pem --from-file=./ca-key.pem --from-file=./root-cert.pem --from-file=./cert-chain.pemIn a new standard Domino install, if you follow the install process, the
fleetcommand-agent(Domino installer) automatically picks up the secret that you created and Istio uses the configured certificates.In an existing Domino installation, you must restart all the pods.
