TLS Certificate¶
To secure the service endpoints, you need a CA-signed TLS certificate(s) and key(s). You have the option of obtaining a single key and certificate. In this case, the certificate can be a wild card certificate or a certificate with specific host names.
Other option is to get a key and certificate for each service endpoint with specific hostname.
The certificate requirements are common for all the cloud providers - AWS, Azure and Google Cloud.
Here are more details on the various options. You can go with one of the options and have your certificate ready before you start the installation.
Wild Card Certificate¶
You can use a single key and wild card certificate all the service endpoints. An example is *.corp.example.com
and use it for all the service endpoints.
Certificate with specific host names generated by Privacera Manager¶
You can use a single key and CA-signed certificate with following hosts in it. The host-names are generated by Privacera Manager using the DEPLOYMENT_ENV_NAME and DOMAIN_NAME that you provide in the vars YAML file.
Service Endpoint Host Names¶
Host Name |
---|
portal-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
solr-service-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
ranger-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
ranger-plugin-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
dataserver-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
auditserver-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
privacera-usersync-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
peg-<ENV_NAME>.<DEPLOYMENT_ENV_NAME> |
diagnostics-server-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
ops-server-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
scheme-server-<DEPLOYMENT_ENV_NAME>.<DOMAIN_NAME> |
Example:
Bash | |
---|---|
Certificate with specific host names generated by you for the service endpoints¶
If you have a different host naming convention then you can override the host names generated by Privacera Manager. Here is the list of YAML variables that you need to set in Privacera Manager. The value has to be a fully qualified host name. You can choose to override only some variables and let the rest be generated by Privacera Manager.
Variable Name |
---|
PORTAL_K8S_NGINX_DNS_NAME |
SOLR_K8S_NGINX_DNS_NAME |
RANGER_K8S_NGINX_DNS_NAME |
RANGER_PLUGIN_K8S_NGINX_DNS_NAME |
DATASERVER_K8S_NGINX_DNS_NAME |
AUDITSERVER_K8S_NGINX_DNS_NAME |
PRIVACERA_USERSYNC_K8S_NGINX_DNS_NAME |
PEG_V2_K8S_NGINX_DNS_NAME peg |
DIAG_SERVER_K8S_NGINX_DNS_NAME |
OPS_SERVER_K8S_NGINX_DNS_NAME |
SCHEME_SERVER_K8S_NGINX_DNS_NAME |
Example:
YAML | |
---|---|