You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Yes, the problem is simple. When certmanager changes the certificate of the tenant, certificate isn't rotated for operator unless manual steps are performed, which is not ideal. We are requesting for an automated way to achieve this.
Describe the solution you'd like
First of all, we should support mutiple tenants, one per secret and secondly, we should keep operator's secrets up to date with respect to the tenant certmanager secret.
then delete certmanager secret in the tenant's namespace, a new one is created by certmanager
notice how operator secret isn't rotated hence hitting this common issue below:
I0325 20:03:26.927950 1 monitoring.go:122]
'tenant-certmanager/myminio' Failed to get cluster health:
Get "https://minio.tenant-certmanager.svc.cluster.local/minio/health/cluster":
tls: failed to verify certificate: x509: certificate signed by unknown authority
(possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "serial:31299030680238480824367599823199567087")
If rotated, above signature wouldn't happen otherwise.
The text was updated successfully, but these errors were encountered:
pjuarezd
changed the title
Operator should rotate the certificate created by certmanager
Operator trust rotate the certificate rotated by certmanager
May 23, 2024
pjuarezd
changed the title
Operator trust rotate the certificate rotated by certmanager
Operator trust the certificate rotated by certmanager
May 23, 2024
pjuarezd
changed the title
Operator trust the certificate rotated by certmanager
Operator trust the certificate rotated by certmanager in tenant
May 23, 2024
Is your feature request related to a problem? Please describe.
Yes, the problem is simple. When certmanager changes the certificate of the tenant, certificate isn't rotated for operator unless manual steps are performed, which is not ideal. We are requesting for an automated way to achieve this.
Describe the solution you'd like
First of all, we should support mutiple tenants, one per secret and secondly, we should keep operator's secrets up to date with respect to the tenant certmanager secret.
related prs:
Do they actually works? I have seen them failing in OpenShift, can we test them truly? and the document?
Describe alternatives you've considered
manual process is the alternative for now
Additional context
I am going to describe the steps for you to see this issue:
If rotated, above signature wouldn't happen otherwise.
The text was updated successfully, but these errors were encountered: