Setting up certificates for Cloudera AI Registry

Cloudera AI Registry requires its own dedicated TLS certificate as it operates through a separate Istio gateway that does not support shared certificates.

After successfully installing the Cloudera AI Registry follow these steps to update the certificates for Cloudera AI Registry:

  1. Generate a certificate for the Cloudera AI Registry domain using the root CA that was updated on the Cloudera Management Console.

    The Domain name can be found in Cloudera AI > AI Registries > MODEL_REGISTRY_NAME > Details > Domain.

    For example: model-registry.apps.ecs-cluster-1.cloudera.com

  2. Apply the certificate by using the following comand:
    kubectl get secret ingress-default-cert-mr -n istio-ingress -o yaml > backup_mr_cert_secret.yaml
    
    kubectl delete secret ingress-default-cert-mr -n istio-ingress
    
    kubectl create secret tls ingress-default-cert-mr --cert=/path/to/mycert.crt --key=/path/to/cert.key -o yaml --dry-run=client | kubectl -n istio-ingress apply -f -