Using the Tanzu Service Mesh CLI, you can add transport layer security (TLS) certificates to Tanzu Service Mesh for use in different situations where secure, TLS-encrypted connections are needed.
You must use a TLS certificate for a public service that is exposed at an HTTPS URL. In this case, you must include the name of the certificate in the public service configuration to ensure secure HTTPS connections to the service.
To add a certificate to Tanzu Service Mesh, you must retrieve the template for a certificate manifest from the Tanzu Service Mesh API and then provide values for the fields in the manifest, including the public certificate and private key strings. As a final step, you must apply the resulting certificate manifest to your tenant in Tanzu Service Mesh.
Prerequisites
Verify that you are familiar with public-key infrastructure (PKI) concepts certificate, private key, certificate authority (CA), and certificate chain.
You have a public certificate and a private key from a trusted certificate authority (CA) and know the location of the certificate and private key files. The certificate file must be in PEM (.pem) format. The private key file must be in PEM or KEY (.key) format.
You can also add a self-signed certificate to Tanzu Service Mesh, such as one that you can generate by using the OpenSSL toolkit. Instructions on generating a self-signed certificate are out of scope of this documentation.
To ensure that the certificate works correctly, verify that the common name (CN) on the certificate is the same as the domain specified in the configuration of a public service. For more information about creating public services with the Tanzu Service Mesh CLI, see Create a Public Service Using the CLI.
Be familiar with the Kubernetes YAML manifest format.
Procedure
What to do next
In the navigation pane on the left, click
.On the Keys & Certificates page, in the table on the Keys & Certificates tab, view the details of the certificate.