-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Certificates management #1169
Comments
Unlike Traefik, docker-cloud/haproxy does not generate certificate on the fly. If we stick with docker-cloud/haproxy, one way to do it is to plan a maintenance window (short, a few seconds), frequency should be higher than once every 90 days, during which:
We don't have scheduled tasks yet in AMP, so today we're not able to address it without system level operations. |
Taken from the Certificate management for AMPFor local deployment, amp will generate a self signed certificate. You'll have to accept it when you connect the first time to the services on local.appcelerator.io. For remote deployment, if you want to use a valid DNS domain, you can upload a certificate on the Swarm to enable TLS flows. If your domain is As an admin user of the platform, you can replace the certificate in the swarm. For that, prepare the secret as a pem file (includind the private key, the certificate, and the certificate chain), create a new Docker secret in the swarm, and update the amp_proxy service to mount it as
|
Certificates have to be set at platform / stack deployment, and have to be renewed on a regular basis, or replaced in case of a security issue.
Docker secrets:
What should be the process to easily renew certificates and apply them on the cluster?
The text was updated successfully, but these errors were encountered: