Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Supporting custom TLS certificates within the redis-operator #100

Open
dcoxall opened this issue Jun 8, 2023 · 0 comments
Open

Supporting custom TLS certificates within the redis-operator #100

dcoxall opened this issue Jun 8, 2023 · 0 comments

Comments

@dcoxall
Copy link

dcoxall commented Jun 8, 2023

I am currently using the redis-operator in a development environment (trying to make development machines mirror production). In doing this I like to ensure that all services are using TLS just as they do in production. The main difference here is that we have replace certificates with self-signed equivalents (from a development issuer). This means the certificates used are not externally trusted but for the purposes of TLS connections on development envrionments it gets the job done.

When configuring redis (in my case redis-replication) with the correct certificate they work fine but the redis-operator is unable to connect.

{
  "level": "error",
  "ts": 1686245388.6633198,
  "logger": "controller_redis",
  "msg": "Failed to Get the role Info of the",
  "R equest.RedisManager.Namespace": "platform",
  "Request.RedisManager.Name": "example-redis-replication",
  "red is pod": "example-redis-replication-2",
  "error": "x509: certificate is valid for example.plat form.svc, not example-redis-replication-2",
  "stacktrace": "github.com/OT-CONTAINER-KIT/redis-operator/k8 sutils.GetRedisNodesByRole/workspace/k8sutils/redis.go:464 github.com/OT-CONTAINER-KIT/redis-operator/control lers.(*RedisReplicationReconciler).Reconcile/workspace/controllers/redisreplication_controller.go:81 sigs.k8s .io/controller-runtime/pkg/internal/controller.(*Controller).Reconcile/go/pkg/mod/sigs.k8s.io/controller-runti me@v0.11.0/pkg/internal/controller/controller.go:114 sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Con troller).reconcileHandler/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.11.0/pkg/internal/controller/controller .go:311 sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem/go/pkg/mod/s igs.k8s.io/controller-runtime@v0.11.0/pkg/internal/controller/controller.go:266 sigs.k8s.io/controller-runtime/pk g/internal/controller.(*Controller).Start.func2.2/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.11.0/pkg/intern al/controller/controller.go:227"
}

It would be great if the operator itself could support additional certificates without requiring an entirely new image.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant