Securing your web workloads in Cloud Native Runtimes

This topic gives you an overview of securing HTTP connections using TLS certificates in Cloud Native Runtimes, commonly known as CNRs, for VMware Tanzu Application Platform and helps you configure Transport Layer Security (TLS).

Prerequisites

Ensure that you have the Tanzu Application Platform, Cloud Native Runtimes for VMware Tanzu, Contour, and cert-manager installed.

Overview of Cloud Native Runtimes TLS configurations

This section describes default configuration, custom configuration, obtaining, and renewing TLS certificates with Cloud Native Runtimes.

Default TLS configuration in Cloud Native Runtimes

When installing Tanzu Application Platform by using profiles, the cert-manager package is used to facilitate the acquisition, management, and renewal of TLS certificates.

Cloud Native Runtimes automatically acquires TLS certificates for workloads through the shared ingress issuer integrated into the Tanzu Application Platform. The shared.ingress_issuer configuration value in Tanzu Application Platform specifies the ingress issuer and it refers to a cert-manager.io/v1/ClusterIssuer.

By default, the ingress issuer is self-signed and has limits. For more information about the shared ingress issuer, see the following Tanzu Application Platform documentation:

The following TLS features are in Cloud Native Runtimes by default:

  • Auto-TLS

    Cloud Native Runtimes has the Auto-TLS feature enabled by default. It uses the cert-manager package to automate the process of certificate issuance and management. Auto-TLS takes care of requesting, renewing, and configuring TLS certificates for each domain that you configure in your Cloud Native Runtimes settings.

  • Automatic HTTPS Redirection

    By default, Cloud Native Runtimes automatically redirects HTTP traffic to HTTPS for secured services. This ensures that all communication with your applications is encrypted and providing a secure experience for your users.

  • One certificate per hostname

    Cloud Native Runtimes issues a unique certificate for each host name associated with a Knative Service.

Custom TLS configuration in Cloud Native Runtimes

While the default ingress issuer is suitable for testing and evaluation purposes, VMware recommends replacing it with your own issuer for production environments.

There are a few ways to customize TLS configuration in Cloud Native Runtimes:

Replace the shared ingress issuer at the Tanzu Application Platform’s level

You have the flexibility to replace Tanzu Application Platform’s default ingress issuer with any other certificate authority that is compliant with cert-manager ClusterIssuer. For information about how to replace the default ingress issuer, see Replacing the default ingress issuer.

Cloud Native Runtimes uses the issuer specified by the shared.ingress_issuer configuration value to issue certificates for your workload automatically.

Designate another ingress issuer for your workloads in Cloud Native Runtimes only

You can have a shared ingress issuer at the Tanzu Application Platform’s level and designate another issuer used by Cloud Native Runtimes to issue TLS certificates for your workloads. This allows you to customize TLS settings for Cloud Native Runtimes while maintaining a global configuration for other components.

You can designate an ingress issuer for Cloud Native Runtimes by specifying the cnrs.ingress_issuer configuration value. The ingress or TLS configuration for Cloud Native Runtimes takes precedence over the shared ingress issuer.

For information about designating another ingress issuer for your workloads, see Configure Cloud Native Runtimes to use a custom Issuer or ClusterIssuer for details.

Provide an existing TLS certificate for your workloads in Cloud Native Runtimes

If you manually generated a TLS certificate and want to provide it to Cloud Native Runtimes instead of using an ingress issuer, you can follow the instructions in Use your existing TLS Certificate for Cloud Native Runtimes.

Resources on custom TLS configuration for Cloud Native Runtimes

The following resources are helpful for custom TLS configuration for Cloud Native Runtimes:

check-circle-line exclamation-circle-line close-line
Scroll to top icon