You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/docs/tutorials/pca-example.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: "Creating a Certificate Authority (CA) Hierarchy with the AWS Private CA ACK Controller"
3
3
lead: "Use the AWS Private CA ACK Controller to create a CA Hierarchy with a Root and Subordinate CA"
4
4
draft: false
5
-
menu:
5
+
menu:
6
6
docs:
7
7
parent: "tutorials"
8
8
weight: 40
@@ -13,11 +13,11 @@ The CA hierarchy will consist of a root CA that signs the certificate of a subor
13
13
14
14
## Setup
15
15
16
-
Although it is not necessary to use Amazon Elastic Kubernetes Service (Amazon EKS) with ACK, this guide assumes that you have access to an Amazon EKS cluster.
16
+
Although it is not necessary to use Amazon Elastic Kubernetes Service (Amazon EKS) with ACK, this guide assumes that you have access to an Amazon EKS cluster.
17
17
18
-
For automated cluster creation using `eksctl`, see [Getting started with Amazon EKS - `eksctl`](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html).
18
+
For automated cluster creation using `eksctl`, see [Getting started with Amazon EKS - `eksctl`](https://docs.aws.amazon.com/eks/latest/userguide/getting-started-eksctl.html).
19
19
20
-
## Prerequisites
20
+
## Prerequisites
21
21
22
22
This guide assumes that you have:
23
23
- Created an EKS cluster with Kubernetes version 1.16 or higher
@@ -39,23 +39,23 @@ export REGION=us-east-1
39
39
### 2. Install the latest version of the AWS Private Certificate Authority ACK controller into the EKS cluster
@@ -228,7 +228,7 @@ Explanation of the resources listed in the file above:
228
228
-`CertificateAuthorityActivation`: This resource is responsible for taking an AWS Private CA that is in the PENDING_CERTIFICATE state into an ACTIVE state by having you pass in a Certificate Authority as well as the signed CA CSR and the chain of trust for that CA.
229
229
-`Certificate`: A certificate issued by the referenced CA with the given CSR.
230
230
231
-
If you want to have a closer look at the fields that can be passed into the resources, you can find that [here](https://aws-controllers-k8s.github.io/community/reference/) under the `PCA` header.
231
+
If you want to have a closer look at the fields that can be passed into the resources, you can find that [here](https://aws-controllers-k8s.github.io/community/reference/) under the `PCA` header.
232
232
233
233
Run the following command to create the hierarchy:
234
234
@@ -306,7 +306,7 @@ Here we see a `Status: ACTIVE` which indicates the successful creation of the su
306
306
307
307
If the CA Status ends up in a `FAILED` state, there should be messages in the status that should explain why. Remedy this issue and retry creating the CA hierarchy. First you should run `kubectl delete -f certificate_hierarchy.yaml` to clean up what you have done thus far. Afterwards return to step 4 and reattempt creating the CA hierarchy.
308
308
309
-
## Importing an Existing CA into ACK
309
+
## Importing an Existing CA into ACK
310
310
311
311
If you already have an existing activated CA that you want to now manage via the ACK controller, you can do the following.
0 commit comments