-
Notifications
You must be signed in to change notification settings - Fork 509
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to skip CA certificate in TLS config #1617
Comments
@marnixbouhuis I can confirm we have the same problem. I will comment more: MongoDB Kubernetes Operator suggests using cert-manager.io to manage certs. As described in their tutorial it's doable to generate LetsEncrypt certificate key using cert-manager. |
Using Let's Encrypt-issued certificates with a database cluster deployed by the MongoDB Community Operator won't work, unfortunately, even if you were to work around the requirement for a CA certificate. The issue is that the TLS certificate is validated both by clients connecting from outside the Kubernetes cluster using the replica set horizon hostnames defined in the |
@fealebenpae you're right. This is why this ticket is a bit more wide.
|
It's possible to override this with the MongoDB Enterprise operator by setting the spec.externalAccess.externalDoman field on the |
Do we have any timeline for this? @fealebenpae @dan-mckean @slaskawi |
Hey, we are deploying a mongodb cluster that needs to be reachable from outside the cluster over TLS. For this we want to use certificates provisioned using ACME / cert-bot and LetsEncrypt.
When configuring TLS we get the error saying:
This error was introduced in this PR: #1119
According to this issue the
caConfigMap
andcaCertificateSecret
should both be optional: #519Since we are using ACME / LetsEncrypt we do not have the CA certificate in a secret.
The text was updated successfully, but these errors were encountered: