<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How can I use my default cluster issuer or issuer with SAS Viya in SAS Viya</title>
    <link>https://communities.sas.com/t5/SAS-Viya/How-can-I-use-my-default-cluster-issuer-or-issuer-with-SAS-Viya/m-p/875598#M1804</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I'm in the process of deploying SAS Viya, but I have run into a bit of a dilemma and I really need some help, please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm on the &lt;STRONG&gt;CADENCENAME: stable&lt;/STRONG&gt;. and &lt;STRONG&gt;CADENCEVERSION:2023.03&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm deploying SAS Viya using the &lt;CODE&gt;SAS Viya Platform Deployment Operator&lt;/CODE&gt;, and everything works just fine, except that when I try to connect to the application via my ingress definition, I don't get any TLS protection on the endpoint. I'm able to connect and log in, I just get the TLS self-signed warning on the browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I run a &lt;CODE&gt;kubectl describe&lt;/CODE&gt; on one of the ingress definitions created as part of my SAS Viya deployment, this is what I get back.&lt;/P&gt;&lt;PRE class=""&gt;&lt;CODE class=""&gt;&lt;SPAN class=""&gt;Annotations: &lt;STRONG&gt;cert-manager.io/issuer:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt; &lt;SPAN class=""&gt;sas-viya-issuer&lt;/SPAN&gt;&lt;/STRONG&gt;
             &lt;SPAN class=""&gt;nginx.ingress.kubernetes.io/affinity:&lt;/SPAN&gt; &lt;SPAN class=""&gt;cookie&lt;/SPAN&gt;
             &lt;SPAN class=""&gt;nginx.ingress.kubernetes.io/affinity-mode:&lt;/SPAN&gt; &lt;SPAN class=""&gt;persistent&lt;/SPAN&gt;
             &lt;SPAN class=""&gt;nginx.ingress.kubernetes.io/backend-protocol:&lt;/SPAN&gt; &lt;SPAN class=""&gt;HTTPS&lt;/SPAN&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;And I suspect that the default &lt;CODE&gt;sas-viya-isser&lt;/CODE&gt; issuer being used, is what's causing the problem as it's using a self-signed certificate.&lt;/P&gt;&lt;P&gt;However, I am unable to use my own created issuer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried adding this line to the transformers section of my kustomization file&lt;/P&gt;&lt;PRE class=""&gt;&lt;CODE class=""&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;site-config/security/ingress-annotation-transformer.yaml&lt;/SPAN&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;And the contents of the file is&lt;/P&gt;&lt;PRE class=""&gt;&lt;CODE class=""&gt;&lt;SPAN class=""&gt;---&lt;/SPAN&gt;
&lt;SPAN class=""&gt;apiVersion:&lt;/SPAN&gt; &lt;SPAN class=""&gt;builtin&lt;/SPAN&gt;
&lt;SPAN class=""&gt;kind:&lt;/SPAN&gt; &lt;SPAN class=""&gt;PatchTransformer&lt;/SPAN&gt;
&lt;SPAN class=""&gt;metadata:&lt;/SPAN&gt;
  &lt;SPAN class=""&gt;name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;sas-cert-manager-ingress-annotation-transformer&lt;/SPAN&gt;
&lt;SPAN class=""&gt;patch:&lt;/SPAN&gt; &lt;SPAN class=""&gt;|-
  - op: add
    path: /metadata/annotations/cert-manager.io~1issuer
    value: &lt;STRONG&gt;custom-issuer&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;target:&lt;/SPAN&gt;
  &lt;SPAN class=""&gt;kind:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Ingress&lt;/SPAN&gt;
  &lt;SPAN class=""&gt;name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;.*&lt;/SPAN&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;However, when I do this, the pods do not even come up at all, instead, I get an error that the &lt;CODE&gt;sas-viya-ca-certificate-secret&lt;/CODE&gt; cannot be found and I don't understand why, as I expected it to simply replace the annotation on my ingress definition to use my &lt;CODE&gt;custom-issuer&lt;/CODE&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I leave this as the default&lt;/P&gt;&lt;P&gt;The &lt;CODE&gt;custom-issuer&lt;/CODE&gt; which is an issuer and not a cluster-issuer, exists and I have validated that it works, by creating an Ingress and service in that namespace, and I'm able to access the hostname via a browser and it's TLS protected as I would expect.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For some reason though, it doesn't work with SAS Viya.&lt;/P&gt;&lt;P&gt;Is there a way to use my custom issuer or cluster issuer with SAS Viya as opposed to the default &lt;CODE&gt;sas-viya-isser&lt;/CODE&gt; issuer that comes out of the box?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions or pointers would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
    <pubDate>Sat, 13 May 2023 16:05:09 GMT</pubDate>
    <dc:creator>TeeHammed</dc:creator>
    <dc:date>2023-05-13T16:05:09Z</dc:date>
    <item>
      <title>How can I use my default cluster issuer or issuer with SAS Viya</title>
      <link>https://communities.sas.com/t5/SAS-Viya/How-can-I-use-my-default-cluster-issuer-or-issuer-with-SAS-Viya/m-p/875598#M1804</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I'm in the process of deploying SAS Viya, but I have run into a bit of a dilemma and I really need some help, please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm on the &lt;STRONG&gt;CADENCENAME: stable&lt;/STRONG&gt;. and &lt;STRONG&gt;CADENCEVERSION:2023.03&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm deploying SAS Viya using the &lt;CODE&gt;SAS Viya Platform Deployment Operator&lt;/CODE&gt;, and everything works just fine, except that when I try to connect to the application via my ingress definition, I don't get any TLS protection on the endpoint. I'm able to connect and log in, I just get the TLS self-signed warning on the browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I run a &lt;CODE&gt;kubectl describe&lt;/CODE&gt; on one of the ingress definitions created as part of my SAS Viya deployment, this is what I get back.&lt;/P&gt;&lt;PRE class=""&gt;&lt;CODE class=""&gt;&lt;SPAN class=""&gt;Annotations: &lt;STRONG&gt;cert-manager.io/issuer:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt; &lt;SPAN class=""&gt;sas-viya-issuer&lt;/SPAN&gt;&lt;/STRONG&gt;
             &lt;SPAN class=""&gt;nginx.ingress.kubernetes.io/affinity:&lt;/SPAN&gt; &lt;SPAN class=""&gt;cookie&lt;/SPAN&gt;
             &lt;SPAN class=""&gt;nginx.ingress.kubernetes.io/affinity-mode:&lt;/SPAN&gt; &lt;SPAN class=""&gt;persistent&lt;/SPAN&gt;
             &lt;SPAN class=""&gt;nginx.ingress.kubernetes.io/backend-protocol:&lt;/SPAN&gt; &lt;SPAN class=""&gt;HTTPS&lt;/SPAN&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;And I suspect that the default &lt;CODE&gt;sas-viya-isser&lt;/CODE&gt; issuer being used, is what's causing the problem as it's using a self-signed certificate.&lt;/P&gt;&lt;P&gt;However, I am unable to use my own created issuer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've tried adding this line to the transformers section of my kustomization file&lt;/P&gt;&lt;PRE class=""&gt;&lt;CODE class=""&gt;&lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;site-config/security/ingress-annotation-transformer.yaml&lt;/SPAN&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;And the contents of the file is&lt;/P&gt;&lt;PRE class=""&gt;&lt;CODE class=""&gt;&lt;SPAN class=""&gt;---&lt;/SPAN&gt;
&lt;SPAN class=""&gt;apiVersion:&lt;/SPAN&gt; &lt;SPAN class=""&gt;builtin&lt;/SPAN&gt;
&lt;SPAN class=""&gt;kind:&lt;/SPAN&gt; &lt;SPAN class=""&gt;PatchTransformer&lt;/SPAN&gt;
&lt;SPAN class=""&gt;metadata:&lt;/SPAN&gt;
  &lt;SPAN class=""&gt;name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;sas-cert-manager-ingress-annotation-transformer&lt;/SPAN&gt;
&lt;SPAN class=""&gt;patch:&lt;/SPAN&gt; &lt;SPAN class=""&gt;|-
  - op: add
    path: /metadata/annotations/cert-manager.io~1issuer
    value: &lt;STRONG&gt;custom-issuer&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;target:&lt;/SPAN&gt;
  &lt;SPAN class=""&gt;kind:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Ingress&lt;/SPAN&gt;
  &lt;SPAN class=""&gt;name:&lt;/SPAN&gt; &lt;SPAN class=""&gt;.*&lt;/SPAN&gt;
&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;However, when I do this, the pods do not even come up at all, instead, I get an error that the &lt;CODE&gt;sas-viya-ca-certificate-secret&lt;/CODE&gt; cannot be found and I don't understand why, as I expected it to simply replace the annotation on my ingress definition to use my &lt;CODE&gt;custom-issuer&lt;/CODE&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I leave this as the default&lt;/P&gt;&lt;P&gt;The &lt;CODE&gt;custom-issuer&lt;/CODE&gt; which is an issuer and not a cluster-issuer, exists and I have validated that it works, by creating an Ingress and service in that namespace, and I'm able to access the hostname via a browser and it's TLS protected as I would expect.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For some reason though, it doesn't work with SAS Viya.&lt;/P&gt;&lt;P&gt;Is there a way to use my custom issuer or cluster issuer with SAS Viya as opposed to the default &lt;CODE&gt;sas-viya-isser&lt;/CODE&gt; issuer that comes out of the box?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions or pointers would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;</description>
      <pubDate>Sat, 13 May 2023 16:05:09 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Viya/How-can-I-use-my-default-cluster-issuer-or-issuer-with-SAS-Viya/m-p/875598#M1804</guid>
      <dc:creator>TeeHammed</dc:creator>
      <dc:date>2023-05-13T16:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: How can I use my default cluster issuer or issuer with SAS Viya</title>
      <link>https://communities.sas.com/t5/SAS-Viya/How-can-I-use-my-default-cluster-issuer-or-issuer-with-SAS-Viya/m-p/875873#M1805</link>
      <description>Self-signed certificates are still encrypted so you still have TLS protection of the endpoint.&lt;BR /&gt;&lt;BR /&gt;Those names are hard-coded into the TLS objects when you source full-stack-tls or front-door-tls, which the sas-certframe initContainer uses. This container does things like staging the trust store for each pod and requesting or generating internal certificates to secure communication between pods (full stack TLS).&lt;BR /&gt;&lt;BR /&gt;You would probably need to edit the sas-certframe-user-config configMap with the appropriate values for your deployment, though this is not a supported configuration. The supported configurations with Cert-Manager would be for us to create the self-signed certificate and key or it to already exist so we only need to create the sas-viya-issuer.&lt;BR /&gt;&lt;BR /&gt;Configure Cert-Manager Certificate Generator&lt;BR /&gt;&lt;A href="https://go.documentation.sas.com/doc/en/sasadmincdc/v_038/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#n140u7g1uy74ern1o5cvdi87dtrb" target="_blank"&gt;https://go.documentation.sas.com/doc/en/sasadmincdc/v_038/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#n140u7g1uy74ern1o5cvdi87dtrb&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Typically if you don't want self-signed and need to supply a site-signed certificate you would provide that in customer-provided-ca-certificates.yaml and customer-provided-ingress-ceritficate.yaml files, then use cert-manager or openssl to have SAS generate the certificates for inter-pod (full stack) TLS.</description>
      <pubDate>Mon, 15 May 2023 18:48:39 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Viya/How-can-I-use-my-default-cluster-issuer-or-issuer-with-SAS-Viya/m-p/875873#M1805</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2023-05-15T18:48:39Z</dc:date>
    </item>
  </channel>
</rss>

