Preparing for the Validating and Conversion Webhook Servers
Starting with version 3.1.0, the FortiADC Kubernetes Controller introduces Validating and Conversion Webhook Servers. This component acts as a security gatekeeper, ensuring that any Ingress or Custom Resource configuration is technically valid before it is accepted by the cluster and pushed to the FortiADC appliance.
Why cert-manager is Required
The Kubernetes API server requires an encrypted HTTPS connection to communicate with the webhook server. To facilitate this mandatory secure TLS connection, you must deploy cert-manager to automate the issuance and management of the required certificates.
Upon deployment, the controller uses cert-manager to establish a self-signed ClusterIssuer and a Certificate resource, ensuring all internal communication remains encrypted.
|
|
You must complete the cert-manager installation before installing or upgrading to FortiADC Kubernetes Controller 3.1.0. If cert-manager is not running, the controller pod will fail to initialize. |
Installation Steps
Compatibility has been verified with cert-manager v1.19.1. Follow these steps to deploy it using Helm:
-
Add the Jetstack Helm repository:
helm repo add jetstack https://charts.jetstack.io helm repo update
-
Install cert-manager: The following command creates the
cert-managernamespace and installs the necessary Custom Resource Definitions (CRDs):helm install --debug cert-manager jetstack/cert-manager \ --namespace cert-manager \ --create-namespace \ --version v1.19.1 \ --set crds.enabled=true -
Verify the installation: Ensure the cert-manager pods are running before proceeding to the controller deployment:
kubectl get pods -n cert-manager
For more information, see the cert-manager documentation: https://cert-manager.io/docs/installation/.