Skip to content
3 changes: 3 additions & 0 deletions docs/cspell.json
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,7 @@
"Goland",
"Grafana's",
"Gtczk",
"highavailabilitycertmanageraddcommonname",
"HKEY",
"HSTS",
"Hqlo",
Expand Down Expand Up @@ -145,6 +146,7 @@
"Pbbd",
"Pluggable",
"Println",
"privateca",
"Quickstart",
"Quicktime's",
"REDISCLI",
Expand Down Expand Up @@ -184,6 +186,7 @@
"Tatham",
"Tele",
"Templating",
"tlsexistingcasecretname",
"Tmkx",
"Toboth",
"Traefik",
Expand Down
21 changes: 21 additions & 0 deletions docs/pages/deploy-a-cluster/helm-deployments/aws.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,9 @@ these options:
You can use `cert-manager` to provision and automatically renew TLS credentials
by completing ACME challenges via Let's Encrypt.

You can also use `cert-manager` with AWS Private Certificate Authority (PCA) in EKS using the
`aws-privateca-issuer` plugin.

This method uses a Kubernetes `LoadBalancer`, which will provision an underlying AWS Network Load
Balancer (NLB) to handle incoming traffic.

Expand Down Expand Up @@ -330,6 +333,15 @@ highAvailability:
podSecurityPolicy:
enabled: false
```
<Admonition type="note">
If using an AWS PCA with cert-manager, you will need to
[ensure you set](../../reference/helm-reference/teleport-cluster.mdx#highavailabilitycertmanageraddcommonname)
`highAvailability.certManager.addCommonName: true` in your values file. You will also need to get the certificate authority
certificate for the CA (`aws acm-pca get-certificate-authority-certificate --certificate-authority-arn <arn>`),
upload the full certificate chain to a secret, and
[reference the secret](../../reference/helm-reference/teleport-cluster.mdx#tlsexistingcasecretname)
with `tls.existingCASecretName` in the values file.
</Admonition>
</TabItem>
<TabItem label="AWS Certificate Manager">
```yaml
Expand Down Expand Up @@ -411,6 +423,15 @@ enterprise: true # Indicate that this is a Tele
podSecurityPolicy:
enabled: false
```
<Admonition type="note">
If using an AWS PCA with cert-manager, you will need to
[ensure you set](../../reference/helm-reference/teleport-cluster.mdx#highavailabilitycertmanageraddcommonname)
`highAvailability.certManager.addCommonName: true` in your values file. You will also need to get the certificate authority
certificate for the CA (`aws acm-pca get-certificate-authority-certificate --certificate-authority-arn <arn>`),
upload the full certificate chain to a secret, and
[reference the secret](../../reference/helm-reference/teleport-cluster.mdx#tlsexistingcasecretname)
with `tls.existingCASecretName` in the values file.
</Admonition>
</TabItem>
<TabItem label="AWS Certificate Manager">
```yaml
Expand Down