Overview

Adding custom CA certificates to the NextGen gateway is crucial for ensuring secure communication between the gateway and other components within your environment. Custom CA certificates allow you to establish trust between the gateway and the servers it interacts with. By adding these certificates, you enhance the overall security posture of your system, protect sensitive data, and prevent potential security vulnerabilities. This practice is essential to maintain the integrity of your communication channels and safeguard your network infrastructure.

Upload the CA certificates to NextGen Gateway

To upload the CA certificate, you need to generate the certificate locally first. After that, you can proceed to upload the locally issued certificate to both the gateway and vprobe service.

Step 1: Save the certificates in /root/custom-certs repository

  1. Create a custom-certs folder within the /root/ directory.

    mkdir -p /root/custom-certs

  2. Change the current directory to /root/custom-certs.

    cd /root/custom-certs

  3. Save all the certificates to /root/custom-certs directory.

    • If you already have certificates, save them with the ‘crt extension.
    • If certificates are not available, see the document to know how to get them.

Step 2: Upload the certificate to NextGen Gateway and OS (Ubuntu)

Once the certificates copying is completed then follow steps to upload it to the NextGen gateway and OS (Ubuntu).

Upload the CA Certificates to OS (Ubuntu)

  1. Run the following commands to upload certificates to OS (Ubuntu).
sudo cp /root/custom-certs/*.crt /usr/local/share/
sudo update-ca-certificates

Upload the Certificate to NextGen Gateway

  1. Create a configmap using following command.

    cd /root/
    kubectl create configmap custom-certs --from-file=custom-certs -n <namespace>

  2. If the gateway is already registered, use the following command to pull and update the helm chart.

    helm pull oci://us-docker.pkg.dev/opsramp-registry/gateway-cluster-charts/nextgen-gw --version 1.6.0
    helm upgrade nextgen-gw nextgen-gw-1.6.0.tgz -n <namespace>

  3. If the gateway is not registered, see the document to register it and then proceed to step 2.