Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Improvement] Share Certificates Among Multiple Components #8278

Closed
iziang opened this issue Oct 15, 2024 · 5 comments · Fixed by #8538
Closed

[Improvement] Share Certificates Among Multiple Components #8278

iziang opened this issue Oct 15, 2024 · 5 comments · Fixed by #8538
Assignees
Labels
kind/enhancement New feature or request
Milestone

Comments

@iziang
Copy link
Contributor

iziang commented Oct 15, 2024

Is your improvement request related to a problem? Please describe.

KubeBlocks currently supports TLS certificates at the component level. However, for sharded clusters where multiple components use the same certificate, there is a need to support sharing certificates among multiple components, or alternatively, support certificates at the cluster level.

Additionally, for example, in the case of ElasticSearch, which has two types of components: ES and Kibana, the Kibana component needs to obtain the CA certificate from the ES component in order to initiate a secure connection.

If this is a new function, please describe the motivation and goals.
A clear and concise description of why you want to happen, link the design doc if possible

Describe the solution you'd like
A clear and concise description of what you want to happen.

Describe alternatives you've considered
A clear and concise description of any alternative solutions or functions you've considered.

Additional context
Add any other context or screenshots about the improvement request here.

@iziang iziang added the kind/enhancement New feature or request label Oct 15, 2024
@shanshanying
Copy link
Contributor

shanshanying commented Oct 15, 2024

kind of similar to #8201

Copy link

This issue has been marked as stale because it has been open for 30 days with no activity

@leon-inf
Copy link
Contributor

@iziang In the scenario of ElasticSearch, Kibana requires the CA certificate to establish an encrypted connection with ElasticSearch, the information Kibana needs is the actual content of the certificate or the path to the local file containing the certificate content?

@iziang
Copy link
Contributor Author

iziang commented Nov 27, 2024

@iziang In the scenario of ElasticSearch, Kibana requires the CA certificate to establish an encrypted connection with ElasticSearch, the information Kibana needs is the actual content of the certificate or the path to the local file containing the certificate content?

Kibana needs the path to the local file containing the CA certificate.

For example, if the CA certificate is located at /path/to/ca_certificate.crt, we would configure Kibana like this:

elasticsearch.ssl.certificateAuthorities: [ "/path/to/ca_certificate.crt" ]

@leon-inf
Copy link
Contributor

@iziang In the scenario of ElasticSearch, Kibana requires the CA certificate to establish an encrypted connection with ElasticSearch, the information Kibana needs is the actual content of the certificate or the path to the local file containing the certificate content?

Kibana needs the path to the local file containing the CA certificate.

For example, if the CA certificate is located at /path/to/ca_certificate.crt, we would configure Kibana like this:

elasticsearch.ssl.certificateAuthorities: [ "/path/to/ca_certificate.crt" ]

In a production environment, the CA certificate should be centrally managed and not shared from a specific component.

@leon-inf leon-inf linked a pull request Nov 27, 2024 that will close this issue
@github-actions github-actions bot removed the Stale label Dec 2, 2024
@github-actions github-actions bot added this to the Release 0.9.2 milestone Dec 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants