helm repo add jetstack https://charts.jetstack.io
kubectl create namespace cert-manager
helm install \
cert-manager jetstack/cert-manager \
--namespace cert-manager \
--version v0.15.1 \
--set installCRDs=true
kubectl apply -f cert-manager.yaml
helm install nats -f nats.yaml nats/nats
Created
June 25, 2020 20:56
-
-
Save wallyqs/d9c9131a5bd5e247b2e4a6d4aac898af to your computer and use it in GitHub Desktop.
NATS Helm Charts + Cert Manager
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
apiVersion: cert-manager.io/v1alpha2 | |
kind: ClusterIssuer | |
metadata: | |
name: selfsigning | |
spec: | |
selfSigned: {} | |
--- | |
apiVersion: cert-manager.io/v1alpha2 | |
kind: Certificate | |
metadata: | |
name: nats-ca | |
spec: | |
secretName: nats-ca | |
duration: 8736h # 1 year | |
renewBefore: 240h # 10 days | |
issuerRef: | |
name: selfsigning | |
kind: ClusterIssuer | |
commonName: nats-ca | |
usages: | |
- cert sign | |
organization: | |
- Your organization | |
isCA: true | |
--- | |
apiVersion: cert-manager.io/v1alpha2 | |
kind: Issuer | |
metadata: | |
name: nats-ca | |
spec: | |
ca: | |
secretName: nats-ca | |
--- | |
apiVersion: cert-manager.io/v1alpha2 | |
kind: Certificate | |
metadata: | |
name: nats-server-tls | |
spec: | |
secretName: nats-server-tls | |
duration: 2160h # 90 days | |
renewBefore: 240h # 10 days | |
issuerRef: | |
name: nats-ca | |
kind: Issuer | |
usages: | |
- signing | |
- key encipherment | |
- server auth | |
organization: | |
- Your organization | |
commonName: nats.default.svc.cluster.local | |
dnsNames: | |
- nats.default.svc | |
--- | |
apiVersion: cert-manager.io/v1alpha2 | |
kind: Certificate | |
metadata: | |
name: nats-routes-tls | |
spec: | |
secretName: nats-routes-tls | |
duration: 2160h # 90 days | |
renewBefore: 240h # 10 days | |
issuerRef: | |
name: nats-ca | |
kind: Issuer | |
usages: | |
- signing | |
- key encipherment | |
- server auth | |
- client auth | |
organization: | |
- Your organization | |
commonName: "*.nats.default.svc.cluster.local" | |
dnsNames: | |
- "*.nats.default.svc" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
nats: | |
logging: | |
debug: true | |
trace: true | |
tls: | |
secret: | |
name: nats-server-tls | |
ca: "ca.crt" | |
cert: "tls.crt" | |
key: "tls.key" | |
cluster: | |
enabled: true | |
tls: | |
secret: | |
name: nats-routes-tls | |
ca: "ca.crt" | |
cert: "tls.crt" | |
key: "tls.key" | |
# Add system credentials to the nats-box instance for example | |
natsbox: | |
enabled: true |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@wallyqs
Any chance you could extend this to show TLS w/ leaf nodes and nats box? Im just unsure about the commonName/dnsNames for these, especially if something like the leafnode will be exposed via a NLB in AWS.