-
I'm trying to set up linkerd to be as declarative and deterministic as possible for installs/upgrades. Ideally I was picturing something like Trying to make a pipeline that is:
Conflicting with my first goal, I'd like to not have to specify the TLS certificates every time. Ideally, I'd have one pipeline that maintains / upgrades linkerd itself, and another one responsible for certificates. Maybe there are some other config values I'd like to "reuse" at some point, but for now just the certs. I was picturing something like: (where any field not set in values.yaml would get default values - not based on any existing values - and values in the specified secret would override values specified in the values.yaml manifests and defaults) I found a discussion about the different config options, but it's not clear to me if this info is up to date or just a proposal. It seems that way since the configmap is still in use. If there are docs on these different configmaps/secrets, I can't seem to find them. Any help is appreciated! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
What problems does helm introduce for you? The Linkerd CLI is a small wrapper around helm, internally. For real production use cases, we generally recommend using Helm directly.
You can configure Linkerd to use externally-provided certificates. Generally, we see people using cert-manager and trust to accomplish this sort of thing. This should work with either the CLI or Helm. |
Beta Was this translation helpful? Give feedback.
What problems does helm introduce for you? The Linkerd CLI is a small wrapper around helm, internally. For real production use cases, we generally recommend using Helm directly.
You can configure Linkerd to use externally-provided certificates. Generally, we see people using cert-manager and trust to accomplish this sort of thing. This should work with either the CLI or Helm.