Skip to main content
Version: 3.18 (latest)

Provide TLS certificates for Linseed APIs

Big picture​

Provide TLS certificates to secure access to Calico Enterprise to the Linseed components.

Value​

Providing TLS certificates for Calico Enterprise Linseed components is recommended as part of a zero trust network model for security.

Before you begin...​

By default, Calico Enterprise uses self-signed certificates for its Linseed components. To provide TLS certificates, get the certificate and key pair for the Calico Enterprise Linseed using any X.509-compatible tool or from your organization's Certificate Authority. The certificate must have Common Name or a Subject Alternate Name of tigera-linseed.tigera-elasticsearch.svc.

How to​

Add TLS certificates for PacketCapture​

To provide TLS certificates for use by Calico Enterprise Linseed components during deployment, you must create a secret before applying the 'custom-resource.yaml' or before creating the LogStorage resource. Use the following command to create a secret:

kubectl create secret generic tigera-secure-linseed-cert -n tigera-operator --from-file=tls.crt=</path/to/certificate-file> --from-file=tls.key=</path/to/key-file>

To update existing certificates, run the following command:

kubectl create secret generic tigera-secure-linseed-cert -n tigera-operator --from-file=tls.crt=</path/to/certificate-file> --from-file=tls.key=</path/to/key-file> --dry-run -o yaml --save-config | kubectl replace -f -