You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Exponential backoff after a failed sync](#exponential-backoff-after-a-failed-sync)
22
23
-[Forcing an immediate sync](#forcing-an-immediate-sync)
@@ -37,7 +38,7 @@ In containerized environments, we use `cert-manager` to automatically provision,
37
38
38
39
These certificates are managed entirely through code using git ops, and developers / operators never need to touch / see the actual plain-text certificate as it is automatically provisioned and attached to gateway.
39
40
40
-
However for applications that sit behind the Incapsula WAF, or have components in both EKS and CloudFront, there was not a seamless and secure process to attach certificates without operators manually passing DNS01 challenge records back and forth or worse, passing TLS certs back and forth.
41
+
However for applications that sit behind the Incapsula WAF, or have components in both EKS and CloudFront, there was not a seamless and secure process to attach certificates without operators manually passing DNS01 challenge records back and forth or worse, passing TLS certs back and forth.
41
42
42
43
In addition to the security risk this poses, it also introduces a level of human error and manual tracking of expiry / renewals.
43
44
@@ -235,6 +236,29 @@ Annotations:
235
236
cert-manager-sync.lestak.sh/threatx-secret-name: "example-threatx-api-secret" # secret in same namespace which contains the threatx api key. If provided in format "namespace/secret-name", will look in that namespace for the secret
236
237
```
237
238
239
+
### Tencent Cloud
240
+
241
+
Create a TencentCloud API Key and create a kube secret in whatever namespace you want.
You will then annotate your k8s TLS secret with this secret name to tell the operator to retrieve the TencentCloud API secret from this location.
250
+
251
+
Annotations:
252
+
253
+
```yaml
254
+
cert-manager-sync.lestak.sh/tencentcloud-secret-name: "tencentcloud-api-secret" # namespace/name of the secret which contains the api key. If provided in format "namespace/secret-name", will look in that namespace for the secret
255
+
cert-manager-sync.lestak.sh/tencentcloud-secretIdKeyName: "TENCENTCLOUD_SECRET_ID" # keyname of the secret id in k8s secret
256
+
cert-manager-sync.lestak.sh/tencentcloud-secretKeyKeyName: "TENCENTCLOUD_SECRET_KEY" # keyname of the secret key in k8s secret
257
+
cert-manager-sync.lestak.sh/tencentcloud-alias: "xxx" # alias of the uploaded cert
258
+
cert-manager-sync.lestak.sh/tencentcloud-projectId: "1" # project id of the uploaded cert, must be a uint64
259
+
cert-manager-sync.lestak.sh/tencentcloud-resources: "cdn,waf,teo" # resource type that will be deployed with the cert
260
+
```
261
+
238
262
## Multiple Sync Destinations
239
263
240
264
You are able to sync to multiple destinations from a single source secret by suffixing your config keys with a common index.
@@ -398,9 +422,8 @@ ENABLED_NAMESPACES= # csv of namespaces to watch. default is empty (all namespac
398
422
SECRETS_NAMESPACE= # DEPRECATED, replaced by ENABLED_NAMESPACES. Namespace to look for secrets in. overrides ENABLED_NAMESPACES if set
399
423
OPERATOR_NAME=cert-manager-sync.lestak.sh # Operator name. use for white-labeling
0 commit comments