Skip to content

Commit cb35db4

Browse files
Merge pull request #10 from getk12/patch-10
Update tutorial-connected-registry-arc.md
2 parents 5dc1b2f + ebe9d3f commit cb35db4

File tree

1 file changed

+26
-37
lines changed

1 file changed

+26
-37
lines changed

articles/container-registry/tutorial-connected-registry-arc.md

Lines changed: 26 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,33 @@
11
---
22
title: "Secure and deploy Connected registry Arc extension"
3-
description: "Learn to secure the Connected registry Arc extension deployment with HTTPS, TLS, optional no TLS, BYO certificate, and inherent trust."
3+
description: "Learn to secure the connected registry Arc extension deployment with HTTPS, TLS, optional no TLS, BYOC certificate, and trust distribution."
44
author: tejaswikolli-web
55
ms.author: tejaswikolli
66
ms.service: azure-container-registry
77
ms.topic: tutorial #Don't change.
88
ms.date: 06/17/2024
99

10-
#customer intent: Learn how to secure and deploy the Connected registry extension with HTTPS, TLS encryption, and upgrades/rollbacks to secure the extension deployment.
10+
#customer intent: Learn how to secure and deploy the connected registry extension with HTTPS, TLS encryption, and upgrades/rollbacks.
1111

1212
---
1313

14-
# Tutorial: Secure and deploy Connected registry Arc extension
14+
# Tutorial: Secure deployment methods for the connected registry extension
1515

16-
The Connected registry extension deployment can be secured with HTTPS, Transport Layer Security (TLS) encryption, and inherent trust distribution.
16+
These tutorials cover various deployment scenarios for the connected registry extension in an Arc-enabled Kubernetes cluster. Once the connected registry extension is installed, you can synchronize images from your cloud registry to on-premises or remote locations.
1717

18-
The Connected registry is a managed service that enables customers to securely manage and access containerized workloads across multiple locations, including on-premises and remote sites. The Connected registry integrates with Azure Arc, providing a unified lifecycle management experience for Kubernetes-based containerized workloads.
18+
Before you dive in, take a moment to learn how Arc-enabled Kubernetes works conceptually.
1919

20-
Follow the [quickstart][quickstart] to create an Azure Arc-enabled Kubernetes cluster. Deploying Secure-by-default settings imply the following configuration is being used: HTTPS, Read Only, Trust Distribution, Cert Manager service.
20+
The connected registry can be securely deployed using various encryption methods. To ensure a successful deployment, follow the quickstart guide to review prerequisites and other pertinent information. By default, the connected registry is configured with HTTPS, ReadOnly mode, Trust Distribution, and the Cert Manager service. You can add more customizations and dependencies as needed, depending on your scenario.
21+
22+
### What is Cert Manager service?
23+
24+
The connected registry cert manager is a service that manages TLS certificates for the connected registry extension in an Azure Arc-enabled Kubernetes cluster. It ensures secure communication between the connected registry and other components by handling the creation, renewal, and distribution of certificates. This service can be installed as part of the connected registry deployment, or you can use an existing cert manager if it's already installed on your cluster.
25+
26+
Cert-Manager is an open-source Kubernetes add-on that automates the management and issuance of TLS certificates from various sources. It manages the lifecycle of certificates issued by CA pools created using CA Service, ensuring they are valid and renewed before they expire.
27+
28+
### What is Trust Distribution?
29+
30+
Connected registry trust distribution refers to the process of securely distributing trust between the connected registry service and Kubernetes clients within a cluster. This is achieved by using a Certificate Authority (CA), such as cert-manager, to sign TLS certificates, which are then distributed to both the registry service and the clients. This ensures that all entities can securely authenticate each other, maintaining a secure and trusted environment within the Kubernetes cluster..
2131

2232
In this tutorial, you:
2333

@@ -31,34 +41,11 @@ In this tutorial, you:
3141

3242
To complete this tutorial, you need:
3343

34-
* Create or use an existing Azure Container Registry (ACR) with [quickstart.][create-acr]
35-
36-
* Set up the firewall access and communication between the ACR registry and the Connected registry by enabling the [dedicated data endpoints.][dedicated data endpoints]
37-
38-
* Create or use an existing Azure Kubernetes Service (AKS) cluster with the [tutorial.][tutorial-aks-cluster]
39-
40-
* Set up the connection between the Kubernetes cluster and Azure Arc by following the [quickstart.][quickstart-connect-cluster]
41-
42-
* Set up the [Azure CLI][Install Azure CLI] to connect to Azure and Kubernetes.
44+
* Follow the [quickstart][quickstart] to securely deploy the connected registry extension.
4345

44-
* Use the [k8s-extension][k8s-extension] command to manage Kubernetes extensions.
46+
## Deploy connected registry extension using your preinstalled cert-manager
4547

46-
```azurecli
47-
az extension add --name k8s-extension
48-
```
49-
* Register the required [Azure resource providers][azure-resource-provider-requirements] in your subscription and use Azure Arc-enabled Kubernetes:
50-
51-
```azurecli
52-
az provider register --namespace Microsoft.Kubernetes
53-
az provider register --namespace Microsoft.KubernetesConfiguration
54-
```
55-
An Azure resource provider is a set of REST operations that enable functionality for a specific Azure service.
56-
57-
* Follow the [quickstart][quickstart] to create an Azure Arc-enabled Kubernetes cluster. Apply Secure-by-default settings imply the following configuration is being used: HTTPS, Read Only, Trust Distribution, Cert Manager service.
58-
59-
## Deploy Connected registry extension using preinstalled cert-manager
60-
61-
While using a preinstalled cert-manager service on the cluster, you can deploy the Connected registry extension with HTTPS (TLS encryption) by following the steps:
48+
In this tutorial, we demonstrate how to use a preinstalled cert-manager service on the cluster. This setup gives you control over certificate management, enabling you to deploy the connected registry extension with encryption by following the steps provided:
6249

6350
1. Run the [az-k8s-extension-create][az-k8s-extension-create] command in the [quickstart][quickstart] and set the `cert-manager.enabled=true` and `cert-manager.install=false` parameters to determine the cert-manager service is installed and enabled:
6451

@@ -75,7 +62,7 @@ While using a preinstalled cert-manager service on the cluster, you can deploy t
7562
7663
## Deploy Connected registry extension using Bring Your Own Certificate (BYOC)
7764
78-
Bring Your Own Certificate (BYOC) allows customers to use their own public certificate and private key pair for HTTPS (TLS encryption) when deploying the Connected registry extension.
65+
In this tutorial, we demonstrate how to use your own certificate (BYOC) on the cluster. BYOC allows you to use your own public certificate and private key pair, giving you control over certificate management. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
7966
8067
>[!NOTE]
8168
>BYOC is applicable for customers who bring their own certificate that is already trusted by their Kubernetes nodes. It is not recommended to manually update the nodes to trust the certificates.
@@ -129,7 +116,9 @@ export TLS_KEY=$(cat mycert.key | base64 -w0)
129116
--config-protected-file protected-settings-extension.json
130117
```
131118
132-
## Deploy Connected registry with kubernetes secret management
119+
## Deploy connected registry with Kubernetes secret management
120+
121+
In this tutorial, we demonstrate how to use a Kubernetes secret on your cluster. Kubernetes secret allows you to securely manage authorized access between pods within the cluster. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
133122
134123
Follow the [quickstart][quickstart] and add the Kubernetes TLS secret string variable + value pair.
135124
@@ -191,9 +180,9 @@ Now, you can deploy the Connected registry extension with HTTPS (TLS encryption)
191180
--config-protected-file protected-settings-extension.json
192181
```
193182

194-
## Deploy the Connected registry Arc extension with inherent trust distribution and reject Connected registry trust distribution
183+
## Deploy the connected registry using your own trust distribution and disable the connected registry's default trust distribution
195184

196-
While using your own kubernetes secret or public certificate and private key pairs, you can deploy the Connected registry extension with HTTPS (TLS encryption), inherent trust distribution, and reject Connected registry trust distribution.
185+
In this tutorial, we demonstrate how to configure trust distribution on the cluster. While using your own Kubernetes secret or public certificate and private key pairs, you can deploy the connected registry extension with TLS encryption, your inherent trust distribution, and reject the connected registry’s default trust distribution. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
197186

198187
1. Follow the [quickstart][quickstart] to add either the Kubernetes secret or public certificate, and private key variable + value pairs in the protected settings file in JSON format.
199188

@@ -260,4 +249,4 @@ By deleting the Connected registry extension and the Connected registry, you rem
260249
<!-- LINKS - external -->
261250
[az-k8s-extension-create]: /cli/azure/k8s-extension#az-k8s-extension-create
262251
[az-k8s-extension-delete]: /cli/azure/k8s-extension#az-k8s-extension-delete
263-
[az-acr-connected-registry-delete]: /cli/azure/acr/connected-registry#az-acr-connected-registry-delete
252+
[az-acr-connected-registry-delete]: /cli/azure/acr/connected-registry#az-acr-connected-registry-delete

0 commit comments

Comments
 (0)