Skip to content

Commit e0f219e

Browse files
authored
Merge pull request #31490 from bergerhoffer/OSDOCS-2028
OSDOCS-2028: Adding note about additional subject for headless services
2 parents db34afe + 7ab4539 commit e0f219e

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

modules/customize-certificates-add-service-serving.adoc

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,16 @@
55
[id="add-service-certificate_{context}"]
66
= Add a service certificate
77

8-
To secure communication to your service, generate a
9-
signed serving certificate and key pair into a secret in the same
10-
namespace as the service.
8+
To secure communication to your service, generate a signed serving certificate and key pair into a secret in the same namespace as the service.
9+
10+
The generated certificate is only valid for the internal service DNS name `<service.name>.<service.namespace>.svc`, and is only valid for internal communications. If your service is a headless service (no `clusterIP` value set), the generated certificate also contains a wildcard subject in the format of `*.<service.name>.<service.namespace>.svc`.
1111

1212
[IMPORTANT]
1313
====
14-
The generated certificate is only valid for the internal service DNS name
15-
`<service.name>.<service.namespace>.svc`, and are only valid for
16-
internal communications.
14+
Because the generated certificates contain wildcard subjects for headless services, you must not use the service CA if your client must differentiate between individual pods. In this case:
15+
16+
* Generate individual TLS certificates by using a different CA.
17+
* Do not accept the service CA as a trusted CA for connections that are directed to individual pods and must not be impersonated by other pods. These connections must be configured to trust the CA that was used to generate the individual TLS certificates.
1718
====
1819

1920
.Prerequisites:

0 commit comments

Comments
 (0)