How do I enable TLS for telemetry and gNMI on_change support?
Purpose
To enable TLS communication between MDM and managed NEs after an NSP system deployment, you must deploy a signed TLS server certificate to each MDM-managed device that supports gRPC TLS, and import the corresponding CA certificate to each MDM truststore. While it is possible to have more than one CA certificate added to each MDM truststore, it is generally preferable to limit the number of CA certificates to the minimum required to adequately secure the network.
The following steps describe how to secure the following NSP communication with NEs by importing a TLS certificate:
Note: TLS certificates used for nodal mediation (gRPC) are separate from the certificates used for secure communication between the NSP components and NBI-related certificates.
Note: release-ID in a file path has the following format:
R.r.p-rel.version
where
R.r.p is the NSP release, in the form MAJOR.minor.patch
version is a numeric value
Steps
1 |
Log in as the root user on the NSP deployer host. |
2 |
Transfer the CA certificate to the following directory: /opt/nsp/NSP-CN-DEP-release-ID/NSP-CN-release-ID/tls/telemetry Note: You must not modify or delete any existing file in the directory. |
3 |
Log in as the root user on the NSP cluster host. |
4 |
Open a console window. |
5 |
Enter the following commands to delete the nsp-tls Kubernetes secret: # kubectl delete secret nsp-tls -n $(kubectl get secrets -A | awk '/nsp-tls-psa-privileged/ {print $1;exit}') ↵ # kubectl delete secret nsp-tls -n $(kubectl get secrets -A | awk '/nsp-tls-psa-baseline/ {print $1;exit}') ↵ # kubectl delete secret nsp-tls -n $(kubectl get secrets -A | awk '/nsp-tls-psa-restricted/ {print $1;exit}') ↵ |
6 |
Open a console window on the NSP deployer host. |
7 |
Enter the following: Note: If the NSP cluster VMs do not have the required SSH key, you must include the --ask-pass argument in the command, as shown in the following examples, and are subsequently prompted for the root password of each cluster member: nspdeployerctl --ask-pass install --config –-deploy # /opt/nsp/NSP-CN-DEP-release-ID/bin/nspdeployerctl install --config –-deploy ↵ The certificate file is made available to each MDM instance, but not yet imported. |
Import certificate to MDM servers | |
8 |
Perform one of the following to import the TLS certificate to the TLS truststore on each MDM server.
|
9 |
Close the open console windows. End of steps |