OpenShift Container Platform typically supports edge-terminated TLS applications in a simple way for application developers through the route resource. This is accomplished through a wildcard certificate which will usually take a form like *.apps.cluster.domain.example.com
. By default when exposing a service in OpenShift, a hostname is created by combining the service name (such as console
) with a project (like openshift-console
) to create a FQDN for a host, resulting in a host name like console-openshift-console.apps.cluster.domain.example.com
. This just "works" due to the cluster wildcard certificate.
However, it is possible to manage custom certificates for use with OpenShift routes or Kubernetes ingress resources. The Cert-Manager CNCF project provides a handy tool to request custom TLS certificates for OpenShift, or any other Kubernetes platform. This gist will walk through setting