This message was deleted.
# k3s
a
This message was deleted.
b
I have verified that it's enough to add root CA to the pod so it could access GHES by creating the certificate file in the pods directory /etc/ssl/certs and then I added it to the curl command:
Copy code
curl -v <https://github.myexample.com> --cacert /etc/ssl/certs/rootCA.crt
Would be good to understand where that root CA should be added in K3S so pods could use it.
r
You might use trust-manager to distribute CAs to namespaces after creating a k8s secret or configmap containing the trusted CA certificate.
That would compose a CA bundle as yet another configmap which may then be mounted on any container for use by an application.
b
Hi, Thank you for your reply! I created a configMap and then attacked it directly in the deployment. That helped to solve an issue.
177 Views