Skip to content

Instantly share code, notes, and snippets.

@jwsy
Created February 3, 2020 03:50
Show Gist options
  • Save jwsy/15ab93901021aade9042559804627565 to your computer and use it in GitHub Desktop.
Save jwsy/15ab93901021aade9042559804627565 to your computer and use it in GitHub Desktop.
cert-manager install
PS C:\Users\jyee> kubectl create namespace cert-manager
namespace/cert-manager created
PS C:\Users\jyee> kubectl apply --validate=false -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.12/deploy/manifests/00-crds.yaml
customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created
customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created
PS C:\Users\jyee> kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true
namespace/cert-manager labeled
PS C:\Users\jyee> helm repo add jetstack https://charts.jetstack.io
"jetstack" has been added to your repositories
PS C:\Users\jyee> helm repo update
Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "jetstack" chart repository
Update Complete. ⎈ Happy Helming!⎈
PS C:\Users\jyee> helm install cert-manager jetstack/cert-manager --namespace cert-manager --version v0.12.0
NAME: cert-manager
LAST DEPLOYED: Sun Jan 19 08:44:21 2020
NAMESPACE: cert-manager
STATUS: deployed
REVISION: 1
TEST SUITE: None
NOTES:
cert-manager has been deployed successfully!
In order to begin issuing certificates, you will need to set up a ClusterIssuer
or Issuer resource (for example, by creating a 'letsencrypt-staging' issuer).
More information on the different types of issuers and how to configure them
can be found in our documentation:
https://docs.cert-manager.io/en/latest/reference/issuers.html
For information on how to configure cert-manager to automatically provision
Certificates for Ingress resources, take a look at the `ingress-shim`
documentation:
https://docs.cert-manager.io/en/latest/reference/ingress-shim.html
PS C:\Users\jyee> kubectl.exe -n cert-manager get pods,services,ingresses NAME READY STATUS RESTARTS AGE
pod/cert-manager-754d9b75d9-84hqc 1/1 Running 0 90s
pod/cert-manager-cainjector-85fbdf788-mmxjj 1/1 Running 0 90s
pod/cert-manager-webhook-76f9b64b45-t58xs 1/1 Running 0 90s
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/cert-manager ClusterIP 10.96.129.87 <none> 9402/TCP 90s
service/cert-manager-webhook ClusterIP 10.96.38.205 <none> 443/TCP 90s
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment