Skip to content

Commit edf21e4

Browse files
authored
docs: update quick start docs with cert manager instructions (#295)
Signed-off-by: Charles-Edouard Brétéché <[email protected]>
1 parent 0f48276 commit edf21e4

File tree

1 file changed

+36
-6
lines changed

1 file changed

+36
-6
lines changed

website/docs/quick-start/authz-server.md

+36-6
Original file line numberDiff line numberDiff line change
@@ -56,9 +56,34 @@ Notice that in the configuration, we define an `extensionProviders` section that
5656
[...]
5757
```
5858

59+
### Deploy cert-manager
60+
61+
The Kyverno Authz Server comes with a validation webhook and needs a certificate to let the api server call into it.
62+
63+
Let's deploy `cert-manager` to manage the certificate we need.
64+
65+
```bash
66+
# install cert-manager
67+
helm install cert-manager \
68+
--namespace cert-manager --create-namespace \
69+
--wait \
70+
--repo https://charts.jetstack.io cert-manager \
71+
--set crds.enabled=true
72+
73+
# create a self-signed cluster issuer
74+
kubectl apply -f - <<EOF
75+
apiVersion: cert-manager.io/v1
76+
kind: ClusterIssuer
77+
metadata:
78+
name: selfsigned-issuer
79+
spec:
80+
selfSigned: {}
81+
EOF
82+
```
83+
5984
### Deploy the Kyverno Authz Server
6085

61-
The first step is to deploy the Kyverno Authz Server.
86+
Now we can deploy the Kyverno Authz Server.
6287

6388
```bash
6489
# create the kyverno namespace
@@ -68,9 +93,13 @@ kubectl create ns kyverno
6893
kubectl label namespace kyverno istio-injection=enabled
6994

7095
# deploy the kyverno authz server
71-
helm install kyverno-authz-server --namespace kyverno --wait \
72-
--repo https://kyverno.github.io/kyverno-envoy-plugin \
73-
kyverno-authz-server
96+
helm install kyverno-authz-server \
97+
--namespace kyverno \
98+
--wait \
99+
--repo https://kyverno.github.io/kyverno-envoy-plugin kyverno-authz-server \
100+
--set certificates.certManager.issuerRef.group=cert-manager.io \
101+
--set certificates.certManager.issuerRef.kind=ClusterIssuer \
102+
--set certificates.certManager.issuerRef.name=selfsigned-issuer
74103
```
75104

76105
### Deploy a sample application
@@ -85,8 +114,9 @@ kubectl create ns demo
85114
kubectl label namespace demo istio-injection=enabled
86115

87116
# deploy the httpbin application
88-
kubectl apply -n demo -f \
89-
https://raw.githubusercontent.com/istio/istio/master/samples/httpbin/httpbin.yaml
117+
kubectl apply \
118+
-n demo \
119+
-f https://raw.githubusercontent.com/istio/istio/master/samples/httpbin/httpbin.yaml
90120
```
91121

92122
### Deploy an Istio AuthorizationPolicy

0 commit comments

Comments
 (0)