Skip to content

Commit db26015

Browse files
committed
OCPBUGS-22844: Added pk12util tool command to the nw-ovn-ipsec-north-south-enable.adoc doc
1 parent 44051ed commit db26015

File tree

1 file changed

+25
-17
lines changed

1 file changed

+25
-17
lines changed

modules/nw-ovn-ipsec-north-south-enable.adoc

Lines changed: 25 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ After you apply the machine config, the Machine Config Operator reboots affected
1818
* Install the {oc-first}.
1919
* You have installed the `butane` utility on your local computer.
2020
* You have installed the NMState Operator on the cluster.
21-
* You are logged in to the cluster as a user with `cluster-admin` privileges.
22-
* You have an existing PKCS#12 certificate for the IPsec endpoint and a CA cert in PEM format.
21+
* You logged in to the cluster as a user with `cluster-admin` privileges.
22+
* You have an existing PKCS#12 certificate for the IPsec endpoint and a CA cert in Privacy Enhanced Mail (PEM) format.
2323
* You enabled IPsec in either `Full` or `External` mode on your cluster.
2424
* The OVN-Kubernetes network plugin must be configured in local gateway mode, where `ovnKubernetesConfig.gatewayConfig.routingViaHost=true`.
2525
@@ -33,7 +33,7 @@ After you apply the machine config, the Machine Config Operator reboots affected
3333
$ oc get nodes
3434
----
3535

36-
.. Create a file named `ipsec-config.yaml` that contains a node network configuration policy for the NMState Operator, such as in the following examples. For an overview about `NodeNetworkConfigurationPolicy` objects, see link:https://nmstate.io/kubernetes-nmstate/[The Kubernetes NMState project].
36+
.. Create a file named `ipsec-config.yaml` that has a node network configuration policy for the NMState Operator, such as in the following examples. For an overview about `NodeNetworkConfigurationPolicy` objects, see link:https://nmstate.io/kubernetes-nmstate/[The Kubernetes NMState project].
3737
+
3838
--
3939
.Example NMState IPsec transport configuration
@@ -63,10 +63,10 @@ spec:
6363
ikev2: insist
6464
type: transport
6565
----
66-
<1> Specifies the host name to apply the policy to. This host serves as the left side host in the IPsec configuration.
66+
<1> Specifies the hostname to apply the policy to. This host serves as the left side host in the IPsec configuration.
6767
<2> Specifies the name of the interface to create on the host.
68-
<3> Specifies the host name of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
69-
<4> Specifies the external host name, such as `host.example.com`. The name should match the SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
68+
<3> Specifies the hostname of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
69+
<4> Specifies the external hostname, such as `host.example.com`. The name should match the Storage Area Network (SAN) `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
7070
<5> Specifies the IP address of the external host, such as `10.1.2.3/32`.
7171

7272
.Example NMState IPsec tunnel configuration
@@ -96,10 +96,10 @@ spec:
9696
ikev2: insist
9797
type: tunnel
9898
----
99-
<1> Specifies the host name to apply the policy to. This host serves as the left side host in the IPsec configuration.
99+
<1> Specifies the hostname to apply the policy to. This host serves as the left side host in the IPsec configuration.
100100
<2> Specifies the name of the interface to create on the host.
101-
<3> Specifies the host name of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
102-
<4> Specifies the external host name, such as `host.example.com`. The name should match the SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
101+
<3> Specifies the hostname of the cluster node that terminates the IPsec tunnel on the cluster side. The name should match SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
102+
<4> Specifies the external hostname, such as `host.example.com`. The name should match the SAN `[Subject Alternate Name]` from your supplied PKCS#12 certificates.
103103
<5> Specifies the IP address of the external host, such as `10.1.2.3/32`.
104104
--
105105

@@ -110,16 +110,23 @@ spec:
110110
$ oc create -f ipsec-config.yaml
111111
----
112112

113-
. Provide the following certificate files to add to the Network Security Services (NSS) database on each host. These files are imported as part of the Butane configuration in subsequent steps.
113+
. Give the following certificate files to add to the Network Security Services (NSS) database on each host. These files are imported as part of the Butane configuration in the next steps.
114114
+
115115
--
116116
* `left_server.p12`: The certificate bundle for the IPsec endpoints
117117
* `ca.pem`: The certificate authority that you signed your certificates with
118118
--
119119

120120
. Create a machine config to add your certificates to the cluster:
121-
122-
.. To create Butane config files for the control plane and worker nodes, enter the following command:
121+
+
122+
.. Use the `pk12util` tool, which comes prepackaged with {op-system-base-full}, to specify a password that protects `PKCS#12` files by entering the following command. Ensure that you replace the `<password>` value with your password.
123+
+
124+
[source,terminal]
125+
----
126+
$ pk12util -W "<password>" -i /etc/pki/certs/left_server.p12 -d /var/lib/ipsec/nss/
127+
----
128+
+
129+
.. To create Butane config files for the control plane and compute nodes, enter the following command:
123130
+
124131
[NOTE]
125132
====
@@ -178,8 +185,8 @@ $ for role in master worker; do
178185
EOF
179186
done
180187
----
181-
182-
.. To transform the Butane files that you created in the previous step into machine configs, enter the following command:
188+
+
189+
.. To transform the Butane files that you created in the earlier step into machine configs, enter the following command:
183190
+
184191
[source,terminal]
185192
----
@@ -217,6 +224,7 @@ By default, the MCO updates one machine per pool at a time, causing the total ti
217224
====
218225

219226
. To confirm that IPsec machine configs rolled out successfully, enter the following commands:
227+
+
220228
.. Confirm that the IPsec machine configs were created:
221229
+
222230
[source,terminal]
@@ -230,7 +238,7 @@ $ oc get mc | grep ipsec
230238
80-ipsec-master-extensions 3.2.0 6d15h
231239
80-ipsec-worker-extensions 3.2.0 6d15h
232240
----
233-
241+
+
234242
.. Confirm that the that the IPsec extension are applied to control plane nodes:
235243
+
236244
[source,terminal]
@@ -243,8 +251,8 @@ $ oc get mcp master -o yaml | grep 80-ipsec-master-extensions -c
243251
----
244252
2
245253
----
246-
247-
.. Confirm that the that the IPsec extension are applied to worker nodes:
254+
+
255+
.. Confirm that the IPsec extension are applied to compute nodes:
248256
+
249257
[source,terminal]
250258
----

0 commit comments

Comments
 (0)