Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support Non-K8s Certificate Authority for the Operator #152

Closed
johnrk-zz opened this issue Aug 27, 2020 · 4 comments
Closed

Support Non-K8s Certificate Authority for the Operator #152

johnrk-zz opened this issue Aug 27, 2020 · 4 comments
Assignees

Comments

@johnrk-zz
Copy link
Contributor

EKS does not support the K8s CA. For customers that need to create a secure cluster and want to use EKS, the flexibility to support a non-K8s CA is needed.

As described in this Github issue and demonstrated in this forum post, customers trying to use CockroachDB with EKS have run into this pain point.

cc @taroface

@chrislovecnm
Copy link
Contributor

We already have this functionality build in. I have not tested it, but see

https://github.com/cockroachdb/cockroach-operator/blob/master/api/v1alpha1/cluster_types.go#L48

@taroface
Copy link
Contributor

taroface commented Sep 1, 2020

@chrislovecnm Which parameter does that line refer to? TLSEnabled is a bool. I couldn't find a place in the config to specify ca.crt.

@chrislovecnm
Copy link
Contributor

// (Optional) The secret with certificates and a private key for the TLS endpoint
// on the database port. The standard naming of files is expected (tls.key, tls.crt, ca.crt)
// Default: ""
NodeTLSSecret string `json:"nodeTLSSecret,omitempty"`
// (Optional) The secret with a certificate and a private key for root database user
// Default: ""
ClientTLSSecret string `json:"clientTLSSecret,omitempty"`

These two values

@johnrk-zz
Copy link
Contributor Author

@taroface , this issue is still open but was determined to be a non-MVP issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants