Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support automatic certificate rotation for KES tls secrets #1472

Open
cyvcloud opened this issue Feb 28, 2023 · 3 comments
Open

Support automatic certificate rotation for KES tls secrets #1472

cyvcloud opened this issue Feb 28, 2023 · 3 comments
Assignees
Labels
community enhancement New feature or request

Comments

@cyvcloud
Copy link

Is your feature request related to a problem? Please describe.
We configure our k8s controller manager in a way to only create short lived certificates (using --cluster-signing-duration=96h0m0s). Additionally we use the Minio operator to deploy Minio tenants in combination with KES. We would like to use the auto certificate generation of the operator but this means that after 4 days we have to manually delete the KES tls secret for it to be regenerated by the operator. Otherwise trying to login to the console fails with an error message informing us that the KES service certificate has expired.

Describe the solution you'd like
The operator should rotate the KES certificate and restart the KES pods a certain amount of time before the KES tls certificates expire.

Describe alternatives you've considered
We are currently investigating the use of cert-manager to automate the creation of KES certificates.

@stale
Copy link

stale bot commented Jun 11, 2023

This issue has been automatically marked as stale because it has not had recent activity. It will be closed after 21 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label Jun 11, 2023
@cesnietor
Copy link
Contributor

@pjuarezd is this already fixed?

@stale stale bot removed the stale label Sep 11, 2023
@pjuarezd
Copy link
Member

not sure, will research it

@pjuarezd pjuarezd self-assigned this Sep 12, 2023
@cesnietor cesnietor added enhancement New feature or request and removed triage labels Sep 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
community enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants