Harness GitOps Agent with self-signed certificates
Harness supports self-signed certificates. This topic describes how to install and configure a Harness GitOps Agent to connect to Harness using self-signed certificates.
In this topic we will do the following:
- Create a secret.
- Modify the GitOps Agent YAML.
Create the secret
-
Copy the following YAML to your editor.
apiVersion: v1
kind: Secret
metadata:
name: addcerts
namespace: {agent-namespace}
type: Opaque
stringData:
ca.bundle: |
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-------
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE------- -
Add your certificates to the
ca.bundlefield.
The XXXXXXXXXXXXXXXXXXXXXXXXXXX placeholder indicates the position for the certificate body. Enclose each certificate in BEGIN CERTIFICATE and END CERTIFICATE comments.
Here's one way to get the certificate using openssl:
openssl s_client -servername NAME -connect HOST:PORT
For example,
openssl s_client -servername app.harness.io -connect app.harness.io:443
-
Update the namespace to the respective namespace where the agent is installed.
-
Save the file as
addcerts.yaml. Then apply the manifest to your cluster.kubectl apply -f addcerts.yaml -n {agent-namespace}
Modify the GitOps Agent YAML
If using a Kubernetes Manifest,
-
Open the
gitops-agent.ymlfile in your editor. -
In the
{ GitopsAgentName }-agentConfigMap, set the value ofGITOPS_SERVICE_HTTP_TLS_ENABLEDconfig totrue. -
Save and apply the modified manifest:
kubectl apply -f gitops-agent.yml -n {agent-namespace}
If using a Helm Chart,
- Modify the
values.yamlfile and add thevolumesandvolumeMountssection to the agent field.
Agent:
agent:
volumeMounts:
- mountPath: /tmp/ca.bundle
name: certs-vol
volumes:
- name: certs-vol
secretName: addcerts
optional: true
items:
- key: ca.bundle
path: ca.bundle
- Change the
GITOPS_SERVICE_HTTP_TLS_ENABLEDflag totrueby setting theharness.configMap.http.tlsEnabledoption in thevalues.yamlfile totrue
harness:
nameOverride: harness
configMap:
http:
tlsEnabled: true
certPath: "/tmp/ca.bundle"
If certificates are required to be mounted onto the Argo CD Repo Server and Application Controller, mount them using the following configurations in the values.yaml file.
Repo Server:
repoServer:
name: repo-server
serviceAccount:
create: true
volumeMounts:
- mountPath: /tmp/ca.bundle
name: certs-vol
volumes:
- name: certs-vol
secretName: addcerts
optional: true
items:
- key: ca.bundle
path: ca.bundle
Application Controller:
controller:
name: application-controller
serviceAccount:
create: true
volumeMounts:
- mountPath: /tmp/ca.bundle
name: certs-vol
volumes:
- name: certs-vol
secretName: addcerts
optional: true
items:
- key: ca.bundle
path: ca.bundle