This guide provides information for cluster administrators about advanced installation configuration options for OpenShift Serverless components.
Do not modify any YAML contained inside the |
If your registry uses a self-signed certificate, you must enable tag-to-digest resolution by creating a config map or secret. To enable tag-to-digest resolution, the Knative Serving controller requires access to the container registry.
The following example KnativeServing
custom resource configuration uses a certificate in a config map named certs
in the knative-serving
namespace.
This example triggers the OpenShift Serverless Operator to:
Create and mount a volume containing the certificate in the controller.
Set the required environment variable properly.
apiVersion: operator.knative.dev/v1alpha1
kind: KnativeServing
metadata:
name: knative-serving
namespace: knative-serving
spec:
controller-custom-certs:
name: config-service-ca
type: ConfigMap (1)
1 | The supported types are ConfigMap and Secret . |
If no controller custom cert is specified, this setting defaults to use the config-service-ca
config map.
After tag-to-digest resolution is enabled, the OpenShift Serverless Operator automatically configures Knative Serving controller access to the registry.
The config map or secret must reside in the same namespace as the Knative Serving custom resource definition (CRD). |
High availability, which can be configured using the spec.high-availability
field, defaults to 2
replicas per controller if no number of replicas is specified by a user during the Knative Serving installation.
You can set this to 1
to disable high availability, or add more replicas by setting a higher integer.
apiVersion: operator.knative.dev/v1alpha1
kind: KnativeServing
metadata:
name: knative-serving
namespace: knative-serving
spec:
high-availability:
replicas: 2
For more information about configuring high availability, see High availability on OpenShift Serverless.