This guide provides information for cluster administrators about advanced installation configuration options for OpenShift Serverless components.
This guide provides information for cluster administrators about advanced installation configuration options for Knative Serving.
Do not modify any YAML contained inside the |
If your registry uses a self-signed certificate, you must enable tag-to-digest resolution by creating a ConfigMap or secret. The OpenShift Serverless Operator then automatically configures Knative Serving controller access to the registry.
To enable tag-to-digest resolution, the Knative Serving controller requires access to the container registry.
The ConfigMap or secret must reside in the same namespace as the Knative Serving CustomResourceDefinition (CRD). |
The following example triggers the OpenShift Serverless Operator to:
Create and mount a volume containing the certificate in the controller.
Set the required environment variable properly.
apiVersion: operator.knative.dev/v1alpha1
kind: KnativeServing
metadata:
name: knative-serving
namespace: knative-serving
spec:
controller-custom-certs:
name: certs
type: ConfigMap
The following example uses a certificate in a ConfigMap named certs
in the knative-serving
namespace.
The supported types are ConfigMap
and secret
.
If no controller custom cert is specified, this defaults to the config-service-ca
ConfigMap.
spec:
controller-custom-certs:
name: config-service-ca
type: ConfigMap
For more information about configuring high availability, see High availability on OpenShift Serverless.