From 88fd48308ad6d9d1b21671b2d15bfbf566510fde Mon Sep 17 00:00:00 2001 From: xuezhaojun Date: Fri, 21 Nov 2025 11:35:55 +0800 Subject: [PATCH] docs: update cluster-proxy blog post to use kind cluster's root CA for TLS certificates Replace self-signed CA with kind cluster's root CA to allow all pods and services in the kind cluster to automatically trust cluster-proxy certificates without additional CA certificate mounting. Signed-off-by: xuezhaojun --- .../index.md | 55 ++++++------------- 1 file changed, 16 insertions(+), 39 deletions(-) diff --git a/content/en/blog/cluster-proxy-support-service-proxy/index.md b/content/en/blog/cluster-proxy-support-service-proxy/index.md index 614e576c..55cb6a64 100644 --- a/content/en/blog/cluster-proxy-support-service-proxy/index.md +++ b/content/en/blog/cluster-proxy-support-service-proxy/index.md @@ -84,57 +84,34 @@ kubectl --context kind-hub apply -f https://github.com/cert-manager/cert-manager kubectl --context kind-hub wait --for=condition=ready pod -l app.kubernetes.io/instance=cert-manager -n cert-manager --timeout=300s ``` -Next, create the certificate resources: +Next, create the certificate resources using the kind cluster's root CA. This approach allows all pods and services in the kind cluster to automatically trust the cluster-proxy certificates without requiring additional CA certificate mounting: ```shell +# Create namespace and certificates using kind cluster's CA +kubectl --context kind-hub create namespace open-cluster-management-addon +CA_CRT=$(kubectl --context kind-hub config view --raw -o jsonpath='{.clusters[?(@.name=="kind-hub")].cluster.certificate-authority-data}') +CA_KEY=$(docker exec hub-control-plane cat /etc/kubernetes/pki/ca.key | base64 -w 0) + kubectl --context kind-hub apply -f - <