If there are issues, visit Troubleshooting to view different troubleshooting solutions.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Files needed for each test
There are 3 files that need to be applied to each integration test: -Secret.yml This secret stores the CryptoHub integration-specific partition/application’s API Key for use by the Futurex issuer to authenticate to CryptoHub. The partition/application must have the permission to upload a CSR and access the issuer policy.- Issuer.yml
A Kubernetes Custom Resource Definition (CRD) configuration file that defines a
CryptohubIssuerorCryptohubClusterIssuer. Its primary function is to establish a bridge between the Kubernetescert-manageradd-on and the Futurex CryptoHub platform. It tellscert-managerexactly how to authenticate to and communicate with CryptoHub to request and issue trusted X.509 TLS certificates. - Cert.yml
A file describes the desired properties of a new certificate, triggering the internal generation of a CSR. In the
cert-managerecosystem, the file typically defines a KubernetesCertificateresource.
For the namespace, the
cert.yml, issuer.yml, and secret.yml must be in the same namespace.Names of Kubernetes resources strictly follow
DNS Label Naming (RFC 1035).YAML
YAML
YAML
Minikube
This section will validate the Kubernetescert-manager integration with CryptoHub by setting up the files needed for cert-manager to establish communication with CryptoHub, send a certificate signing request (CSR), and, once approved, retrieve the signed CSR from the CryptoHub.
Secret.yml
YAML
YAML
YAML
Validation steps using the files
Copy and paste the contents in the templates above into appropriately named files, and edit the files to match the values for your specific use case using a tool like
nano or vim.
For this specific validation, the following files contains information to serve as an example:- Secret.yml
YAML
- Issuer.yml
YAML
- Cert.yml
YAML
If no errors arose, a CSR should automatically be created, ready to be signed. To check, run the following command:
Shell
The
-n flag value should be the namespace that you have created.Successful output should like similar to:
None
Use
cmctl to approve the CSR. This will let the cert-manager controller that the request is valid and should proceed to be signed by the assigned issuer.Shell
Login to CryptoHub with the appropriate identity that has the permission to sign the CSR.
- Go to PKI and CA > PKI Signing Approvals.
- Click on the + icon next to the approval group created for this integration.
- A new entry will appear, displaying the yellow paper with a pen, and a status column showing “Pending 0/x”. The value ‘x’ indicates the total number of required approvals or identities that must approve the CSR before the signed certificate is issued.
- To view the details of the CSR, right-click it and select Edit.
- To approve or deny the CSR, either select the CSR and click on Approve or Deny on the bottom right or right-click on the CSR and select Approve or Deny.
- After approving the CSR, a box will appear describing the User that signed the CSR, the Status of the CSR, the Time that it was signed, and a Message box that the user can use to write an optional message.
- Select [ OK ] for the approval to be issued.
To validate if the signed certificate was received, go the terminal where Minikube was installed, and with the name of the
CertificateRequest that was discovered earlier, run the command to find details about the approval process.Shell
A positive output should look something similar to below:
None
Microk8s
Validation steps using the files
Copy and paste the contents in the templates above into appropiately named files, and edit the files to match the values for your specific use case using a tool like
nano or vim.
For this specific validation, the following files contains information to serve as an example:- Secret.yml
YAML
- Issuer.yml
YAML
- Cert.yml
YAML
If no errors arose, a CSR should automatically be created, ready to be signed. To check, run the following command:
Shell
The
-n flag value should be the namespace that you have created.Successful output should like similar to:
None
Login to CryptoHub with the appropriate identity that has the permission to sign the CSR.
- Go to PKI and CA > PKI Signing Approvals.
- Click on the + icon next to the approval group created for this integration.
- A new entry will appear, displaying the yellow paper with a pen, and a status column showing “Pending 0/x”. The value ‘x’ indicates the total number of required approvals or identities that must approve the CSR before the signed certificate is issued.
- To view the details of the CSR, right-click it and select Edit.
- To approve or deny the CSR, either select the CSR and click on Approve or Deny on the bottom right or right-click on the CSR and select Approve or Deny.
- After approving the CSR, a box will appear describing the User that signed the CSR, the Status of the CSR, the Time that it was signed, and a Message box that the user can use to write an optional message.
- Select [ OK ] for the approval to be issued.
To validate if the signed certificate was received, go the terminal where Minikube was installed, and with the name of the
CertificateRequest that was discovered earlier, run the command to find details about the approval processShell
A positive output should look something similar to below:
None
K3s - Single device (Docker)
Validation steps using the files
On the machine hosting the
k3s-server, copy and paste the contents in the templates above into appropiately named files, and edit the files to match the values for your specific use case using a tool like nano or vim.
For this specific validation, the following files contains information to serve as an example- Secret.yml
YAML
- Issuer.yml
YAML
Copy the
k3s.yaml file that was created in the Install the Kubernetes tool page to the agent’s filesystem.Shell
On the
k3s-agent-1 terminal session, edit the k3s.yaml file to change the hostname of the server from 127.0.0.1 or whatever the default value is to the given server hostname or server IP address.Shell
The server’s Docker hostname can be used.
None
On the
k3s-agent-1 terminal session, copy and paste the contents in the cert template above into an appropriately named file (e.g., Cert.yml) , and edit the files to match the values for your specific use case using vi tool.
For this specific validation, the following file contains information to serve as an example.Shell
YAML
A CSR should automatically be created, ready to be approved by
cmctl. On a terminal connected to k3s-server, run the following command to check if the CSR was generated:Shell
The
-n flag value should be the namespace that you have created.Successful output should like similar to:
None
Approve the request using
cmctl so that Kubernetes API can send the certificate over to CryptoHub.Shell
Rerun the
get certificaterequest command and the APPROVED column should be updated to True, and READY to FalseNone
Login into CryptoHub with the appropriate identity that has the permission to sign the CSR.
- Go to PKI and CA > PKI Signing Approvals.
- Click on the + icon next to the approval group created for this integration.
- A new entry will appear, displaying the yellow paper with a pen, and a status column showing “Pending 0/x”. The value ‘x’ indicates the total number of required approvals or identities that must approve the CSR before the signed certificate is issued.
- To view the details of the CSR, right-click it and select Edit.
- To approve or deny the CSR, either select the CSR and click on Approve or Deny on the bottom right or right-click on the CSR and select Approve or Deny.
- After approving the CSR, a box will appear describing the User that signed the CSR, the Status of the CSR, the Time that it was signed, and a Message box that the user can use to write an optional message.
- Select [ OK ] for the approval to be issued.
To validate if the signed certificate was received, on the
k3s-server run:Shell
A positive output should look something similar to below:
None
K3s - Multidevice
Validation steps using the files
On the server machine, copy and paste the contents in the templates above into appropiately named files, and edit the files to match the values for your specific use case using a tool like
nano or vim.
For this specific validation, the following files contains information to serve as an example- Secret.yml
YAML
- Issuer.yml
YAML
Copy the
k3s.yaml from the server machine to the worker machine. The example below uses secure copy, scp.Shell
Edit the
k3s.yaml file on the worker machine to change the hostname of the server from the default value to the the server hostname or server IP address.Shell
None
On the worker machine, copy and paste the contents in the cert template above into an appropriately named file (e.g.,
Cert.yml) , and edit the files to match the values for your specific use case using vi tool.For this specific validation, the following file contains information to serve as an example:Shell
YAML
A CSR should automatically be created, ready to be approved by
cmctl. On the server machine, run the following command to check if the CSR was generated:Shell
The
-n flag value should be the namespace that you have created.Successful output should like similar to:
None
On the server mahcine, approve the request using
cmctl so that Kubernetes API can send the certificate over to CryptoHub.Shell
Rerun the
get certificaterequest command and the APPROVED column should be updated to True, and READY to FalseNone
Login into CryptoHub with the appropriate identity that has the permission to sign the CSR.
- Go to PKI and CA > PKI Signing Approvals.
- Click on the + icon next to the approval group created for this integration.
- A new entry will appear, displaying the yellow paper with a pen, and a status column showing “Pending 0/x”. The value ‘x’ indicates the total number of required approvals or identities that must approve the CSR before the signed certificate is issued.
- To view the details of the CSR, right-click it and select Edit.
- To approve or deny the CSR, either select the CSR and click on Approve or Deny on the bottom right or right-click on the CSR and select Approve or Deny.
- After approving the CSR, a box will appear describing the User that signed the CSR, the Status of the CSR, the Time that it was signed, and a Message box that the user can use to write an optional message.
- Select [ OK ] for the approval to be issued.
To validate if the signed certificate was received, on the server machine run
Shell
A positive output should look something similar to below:
None

