Configure secure HTTPS access to your TrueFoundry deployment
Cloud Provider | Recommended Method | Alternative Methods | Reference Guide |
---|---|---|---|
AWS | AWS Certificate Manager | cert-manager with DNS validation | AWS DNS & TLS Setup |
GCP | cert-manager with Cloud DNS | Manual certificate files | GCP DNS & TLS Setup |
Azure | cert-manager with Azure DNS | Manual certificate files | Azure DNS & TLS Setup |
Generic | Manual certificate files | cert-manager with Let’s Encrypt | Generic Cluster Setup |
*.example.com
)arn:aws:acm:region:account:certificate/certificate-id
)
example.com
)example.com
)VirtualService
to ensure ACME HTTP-01 challenge requests are routed correctly to the cert-manager solver:
<your-domain-here>
with your actual domain (e.g., example.com
or *.example.com
).host
under destination
should match the name of the cert-manager solver service. It is usually cm-acme-http-solver
, but you can confirm this by running:
istio-system
).self-signed-tls
secret as shown in Option 1.