You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I was attempting to disable internode encryption on a running cluster with serverEncryptionStores specified. From the starting state of a cluster up and running with encryption enabled I:
Set optional: true and internode_encryption: all in cassandra.yaml. This triggered a rolling restart
Set optional: true and internode_encryption: none. This triggered a rolling restart which got stuck.
Specifying serverEncryptionStores doesn't necessarily result in secrets being mounted to pods instead the operator checks to see if internode_encryption is not none. In my case I wanted to keep the secrets mounted (and keystore / truststore available) while all of the nodes performed rolling restarts to the point where internode encryption was disabled.
Did you expect to see something different?
Yes, I expect that setting serverEncryptionStores and clientEncryptionSrores should populate the secrets within the pods and set the following in cassandra.yaml.
My next step after step 2 above was to remove the cassandra.yaml settings (optional and internode_encryption) as well as the serverEncryptionStores block.
How to reproduce it (as minimally and precisely as possible):
should be removed. If we have everything needed for a keystore and truststore (IE mount points and passwords) the secrets should be mounted and appropriate values added to cassandra.yaml.
At this point I think we should let the user set (or omit!) values for internode_encryption and optional in the cassandraYaml block. Future features can handle the graceful enabling and disabling (via rolling restarts or certificate reloading depending on the serverType and serverVersion).
What happened?
I was attempting to disable internode encryption on a running cluster with
serverEncryptionStores
specified. From the starting state of a cluster up and running with encryption enabled I:optional: true
andinternode_encryption: all
in cassandra.yaml. This triggered a rolling restartoptional: true
andinternode_encryption: none
. This triggered a rolling restart which got stuck.Specifying
serverEncryptionStores
doesn't necessarily result in secrets being mounted to pods instead the operator checks to see ifinternode_encryption
is notnone
. In my case I wanted to keep the secrets mounted (and keystore / truststore available) while all of the nodes performed rolling restarts to the point where internode encryption was disabled.Did you expect to see something different?
Yes, I expect that setting
serverEncryptionStores
andclientEncryptionSrores
should populate the secrets within the pods and set the following incassandra.yaml
.My next step after step 2 above was to remove the
cassandra.yaml
settings (optional
andinternode_encryption
) as well as theserverEncryptionStores
block.How to reproduce it (as minimally and precisely as possible):
Environment
GKE
Anything else we need to know?:
You are awesome 🚀
┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: K8OP-20
The text was updated successfully, but these errors were encountered: