You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/tutorial-connected-registry-arc.md
+26-37Lines changed: 26 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,33 @@
1
1
---
2
2
title: "Secure and deploy Connected registry Arc extension"
3
-
description: "Learn to secure the Connected registry Arc extension deployment with HTTPS, TLS, optional no TLS, BYO certificate, and inherent trust."
3
+
description: "Learn to secure the connected registry Arc extension deployment with HTTPS, TLS, optional no TLS, BYOC certificate, and trust distribution."
4
4
author: tejaswikolli-web
5
5
ms.author: tejaswikolli
6
6
ms.service: azure-container-registry
7
7
ms.topic: tutorial #Don't change.
8
8
ms.date: 06/17/2024
9
9
10
-
#customer intent: Learn how to secure and deploy the Connected registry extension with HTTPS, TLS encryption, and upgrades/rollbacks to secure the extension deployment.
10
+
#customer intent: Learn how to secure and deploy the connected registry extension with HTTPS, TLS encryption, and upgrades/rollbacks.
11
11
12
12
---
13
13
14
-
# Tutorial: Secure and deploy Connected registry Arc extension
14
+
# Tutorial: Secure deployment methods for the connected registry extension
15
15
16
-
The Connected registry extension deployment can be secured with HTTPS, Transport Layer Security (TLS) encryption, and inherent trust distribution.
16
+
These tutorials cover various deployment scenarios for the connected registry extension in an Arc-enabled Kubernetes cluster. Once the connected registry extension is installed, you can synchronize images from your cloud registry to on-premises or remote locations.
17
17
18
-
The Connected registry is a managed service that enables customers to securely manage and access containerized workloads across multiple locations, including on-premises and remote sites. The Connected registry integrates with Azure Arc, providing a unified lifecycle management experience for Kubernetes-based containerized workloads.
18
+
Before you dive in, take a moment to learn how Arc-enabled Kubernetes works conceptually.
19
19
20
-
Follow the [quickstart][quickstart] to create an Azure Arc-enabled Kubernetes cluster. Deploying Secure-by-default settings imply the following configuration is being used: HTTPS, Read Only, Trust Distribution, Cert Manager service.
20
+
The connected registry can be securely deployed using various encryption methods. To ensure a successful deployment, follow the quickstart guide to review prerequisites and other pertinent information. By default, the connected registry is configured with HTTPS, ReadOnly mode, Trust Distribution, and the Cert Manager service. You can add more customizations and dependencies as needed, depending on your scenario.
21
+
22
+
### What is Cert Manager service?
23
+
24
+
The connected registry cert manager is a service that manages TLS certificates for the connected registry extension in an Azure Arc-enabled Kubernetes cluster. It ensures secure communication between the connected registry and other components by handling the creation, renewal, and distribution of certificates. This service can be installed as part of the connected registry deployment, or you can use an existing cert manager if it's already installed on your cluster.
25
+
26
+
Cert-Manager is an open-source Kubernetes add-on that automates the management and issuance of TLS certificates from various sources. It manages the lifecycle of certificates issued by CA pools created using CA Service, ensuring they are valid and renewed before they expire.
27
+
28
+
### What is Trust Distribution?
29
+
30
+
Connected registry trust distribution refers to the process of securely distributing trust between the connected registry service and Kubernetes clients within a cluster. This is achieved by using a Certificate Authority (CA), such as cert-manager, to sign TLS certificates, which are then distributed to both the registry service and the clients. This ensures that all entities can securely authenticate each other, maintaining a secure and trusted environment within the Kubernetes cluster..
21
31
22
32
In this tutorial, you:
23
33
@@ -31,34 +41,11 @@ In this tutorial, you:
31
41
32
42
To complete this tutorial, you need:
33
43
34
-
* Create or use an existing Azure Container Registry (ACR) with [quickstart.][create-acr]
35
-
36
-
* Set up the firewall access and communication between the ACR registry and the Connected registry by enabling the [dedicated data endpoints.][dedicated data endpoints]
37
-
38
-
* Create or use an existing Azure Kubernetes Service (AKS) cluster with the [tutorial.][tutorial-aks-cluster]
39
-
40
-
* Set up the connection between the Kubernetes cluster and Azure Arc by following the [quickstart.][quickstart-connect-cluster]
41
-
42
-
* Set up the [Azure CLI][Install Azure CLI] to connect to Azure and Kubernetes.
44
+
* Follow the [quickstart][quickstart] to securely deploy the connected registry extension.
43
45
44
-
* Use the [k8s-extension][k8s-extension] command to manage Kubernetes extensions.
46
+
## Deploy connected registry extension using your preinstalled cert-manager
45
47
46
-
```azurecli
47
-
az extension add --name k8s-extension
48
-
```
49
-
* Register the required [Azure resource providers][azure-resource-provider-requirements] in your subscription and use Azure Arc-enabled Kubernetes:
50
-
51
-
```azurecli
52
-
az provider register --namespace Microsoft.Kubernetes
53
-
az provider register --namespace Microsoft.KubernetesConfiguration
54
-
```
55
-
An Azure resource provider is a set of REST operations that enable functionality for a specific Azure service.
56
-
57
-
* Follow the [quickstart][quickstart] to create an Azure Arc-enabled Kubernetes cluster. Apply Secure-by-default settings imply the following configuration is being used: HTTPS, Read Only, Trust Distribution, Cert Manager service.
58
-
59
-
## Deploy Connected registry extension using preinstalled cert-manager
60
-
61
-
While using a preinstalled cert-manager service on the cluster, you can deploy the Connected registry extension with HTTPS (TLS encryption) by following the steps:
48
+
In this tutorial, we demonstrate how to use a preinstalled cert-manager service on the cluster. This setup gives you control over certificate management, enabling you to deploy the connected registry extension with encryption by following the steps provided:
62
49
63
50
1. Run the [az-k8s-extension-create][az-k8s-extension-create] command in the [quickstart][quickstart] and set the `cert-manager.enabled=true` and `cert-manager.install=false` parameters to determine the cert-manager service is installed and enabled:
64
51
@@ -75,7 +62,7 @@ While using a preinstalled cert-manager service on the cluster, you can deploy t
75
62
76
63
## Deploy Connected registry extension using Bring Your Own Certificate (BYOC)
77
64
78
-
Bring Your Own Certificate (BYOC) allows customers to use their own public certificate and private key pair for HTTPS (TLS encryption) when deploying the Connected registry extension.
65
+
In this tutorial, we demonstrate how to use your own certificate (BYOC) on the cluster. BYOC allows you to use your own public certificate and private key pair, giving you control over certificate management. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
79
66
80
67
>[!NOTE]
81
68
>BYOC is applicable for customers who bring their own certificate that is already trusted by their Kubernetes nodes. It is not recommended to manually update the nodes to trust the certificates.
## Deploy Connected registry with kubernetes secret management
119
+
## Deploy connected registry with Kubernetes secret management
120
+
121
+
In this tutorial, we demonstrate how to use a Kubernetes secret on your cluster. Kubernetes secret allows you to securely manage authorized access between pods within the cluster. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
133
122
134
123
Follow the [quickstart][quickstart] and add the Kubernetes TLS secret string variable + value pair.
135
124
@@ -191,9 +180,9 @@ Now, you can deploy the Connected registry extension with HTTPS (TLS encryption)
## Deploy the Connected registry Arc extension with inherent trust distribution and reject Connected registry trust distribution
183
+
## Deploy the connected registry using your own trust distribution and disable the connected registry's default trust distribution
195
184
196
-
While using your own kubernetes secret or public certificate and private key pairs, you can deploy the Connected registry extension with HTTPS (TLS encryption), inherent trust distribution, and reject Connected registrytrust distribution.
185
+
In this tutorial, we demonstrate how to configure trust distribution on the cluster. While using your own Kubernetes secret or public certificate and private key pairs, you can deploy the connected registry extension with TLS encryption, your inherent trust distribution, and reject the connected registry’s default trust distribution. This setup enables you to deploy the connected registry extension with encryption by following the provided steps:
197
186
198
187
1. Follow the [quickstart][quickstart] to add either the Kubernetes secret or public certificate, and private key variable + value pairs in the protected settings file in JSON format.
199
188
@@ -260,4 +249,4 @@ By deleting the Connected registry extension and the Connected registry, you rem
0 commit comments