目录

使用cert-manager颁发自签证书

cert-manager简介

cert-manager 是一个云原生证书管理开源项目,用于在 Kubernetes 集群中自动管理和颁发来自各种颁发源的 TLS 证书,它可以从各种受支持的来源颁发证书,包括 Let’s EncryptHashiCorp VaultVenafi以及私有 PKI,它将确保证书定期有效和更新,并在到期前的适当时间尝试更新证书。

k8s集群中安装cert-manager

参考:https://cert-manager.io/docs/installation/

推荐使用helm chart进行安装:

1
2
3
4
5
6
7
8
9
helm repo add jetstack https://charts.jetstack.io
helm repo update
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.13.0/cert-manager.crds.yaml
helm install \
  cert-manager jetstack/cert-manager \
  --namespace cert-manager \
  --create-namespace \
  --version v1.13.0 \
  # --set installCRDs=true

为nginx-ingress自动签发证书

使用CA

这里使用一个官方的示例,但略有不同:

  • selfsigned-cert.yaml
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
  name: selfsigned-cluster-issuer
spec:
  selfSigned: {}
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: selfsigned-ca
  namespace: cert-manager
spec:
  isCA: true
  commonName: ca.nblh.local
  subject:
    countries:
      - CN
    localities:
      - HangZhou
    organizationalUnits:
      - Root CA
    organizations:
      - nblh.local
    postalCodes:
      - "310000"
    provinces:
      - ZheJiang
    streetAddresses:
      - fandou graden
    serialNumber: SELF20230919
  duration: 43800h
  secretName: selfsigned-ca-secret
  privateKey:
    algorithm: ECDSA
    size: 256
  issuerRef:
    name: selfsigned-cluster-issuer
    kind: ClusterIssuer
    group: cert-manager.io

---
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
  name: cluster-ca-issuer
spec:
  ca:
    secretName: selfsigned-ca-secret
---
# 手动签发证书
# apiVersion: cert-manager.io/v1
# kind: Certificate
# metadata:
#   name: kuard-tls
#   namespace: test
# spec:
#   dnsNames:
#     - kuard.nblh.local
#     - w1.nblh.local
#   issuerRef:
#     group: cert-manager.io
#     kind: ClusterIssuer
#     name: selfsigned-cluster-issuer
#   secretName: kuard-tls
#   duration: 87600h
#   usages:
#   - digital signature
#   - key encipherment

  • kuard-deploy.yaml
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
apiVersion: v1
kind: Service
metadata:
  name: kuard
  namespace: test
spec:
  ports:
  - port: 80
    targetPort: 8080
    protocol: TCP
  selector:
    app: kuard
---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: kuard
  namespace: test
spec:
  selector:
    matchLabels:
      app: kuard
  replicas: 1
  template:
    metadata:
      labels:
        app: kuard
    spec:
      containers:
      - image: gcr.io/kuar-demo/kuard-amd64:blue
        imagePullPolicy: IfNotPresent
        name: kuard
        ports:
        - containerPort: 8080
  • kuard-ingress.yaml
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: kuard
  annotations:
    cert-manager.io/cluster-issuer: "cluster-ca-issuer"
spec:
  ingressClassName: nginx
  tls:
  - hosts:
    - kuard.nblh.local
    - w1.nblh.local
    secretName: kuard-tls
  rules:
  - host: kuard.nblh.local
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: kuard
            port:
              number: 80

应用清单文件创建证书:

1
2
3
4
5
6
kubectl apply -f kuard-deploy.yaml -f selfsigned-cert.yaml -f kuard-ingress.yaml
# 创建完成之后使用以下命令查看证书颁发状态,READY为True则表示已颁发
kubectl get certificate -A
NAMESPACE      NAME            READY   SECRET                 AGE
cert-manager   selfsigned-ca   True    selfsigned-ca-secret   9s
test           kuard-tls       True    kuard-tls              3s

导出证书文件安装到操作系统或者浏览器当中:

1
kubectl get secrets kuard-tls -ojsonpath='{.data.tls\.crt}'  | base64 -d > tls.crt

MacOS钥匙串中选择始终信任:

https://cdn.agou-ops.cn/others/image-20230919150606112.png

打开浏览器直接访问,可以看到自签证书已经可以正常使用:

https://cdn.agou-ops.cn/others/image-20230919150747892.png

直接签发

  • selfsigned-cert.yaml
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
  name: selfsigned-issuer
  namespace: test
spec:
  selfSigned: {}
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: selfsigned-cert
spec:
  dnsNames:
  - kuard.nblh.local
  secretName: selfsigned-cert-tls
  issuerRef:
    name: selfsigned-issuer
  • kuard-ingress.yaml
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: kuard
  annotations:
    cert-manager.io/issuer: "selfsigned-issuer"   # 与上面的issuer对应
spec:
  ingressClassName: nginx
  tls:
  - hosts:
    - kuard.nblh.local
    - w1.nblh.local
    secretName: selfsigned-cert-tls            # 与上面的secret对应
  rules:
  - host: kuard.nblh.local
    http:
      paths:
      - path: /
        pathType: Prefix
        backend:
          service:
            name: kuard
            port:
              number: 80

步骤和上面类似,就不在此赘述。

手动更新证书

1
2
3
4
5
6
7
8
kubectl edit certificate kuard-tls -n test
# 在spec字段下添加以下两行
  duration: 87600h # 10 years
  renewBefore: 720h # 30 days
# 保存并退出

# 删除原来的secret,让certmanager重新自动生成secret
kubectl get certificate kuard-tls -o=jsonpath='{.spec.secretName}' | xargs kubectl delete secret

参考链接