Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rotating the certs for each OS Node #7544

Merged
merged 1 commit into from
Nov 15, 2022

Conversation

SanjuPal01
Copy link
Collaborator

@SanjuPal01 SanjuPal01 commented Nov 15, 2022

Signed-off-by: “SanjuPal01” sanju.sanju@progress.com
"Sahiba3108" sgoyal@progress.com

🔩 Description: What code changed, and why?

I want to rotate my certificates for the Opensearch node from the Bastion host using Automate CLI.

⛓️ Related Resources

https://chefio.atlassian.net/browse/KINETICS-232

👍 Definition of Done

👟 How to Build and Test the Change

Add this package in your manifest while deploying HA:
sahiba3108/automate-ha-deployment/0.1.0/20221028084038

Install this cli in your bastion host:
ssanju/automate-cli/0.1.0/20221115071143

Run the below command in bastion:
prerequisite:
chef-automate cert-rotate --public-cert node1.pem --private-cert node1-key.pem --root-ca root-ca.pem --admin-cert admin.pem --admin-key admin-key.pem --os
the above command will rotate certificates to whole cluster and also update the root-ca in frontend nodes to maintain the connection.

Now if you want to apply some unique public and private certs to some node then you need to run the below command
chef-automate cert-rotate --public-cert node1.pem --private-cert node1-key.pem --node <ip> --os
(You can also use --opensearch flag instead of os)
This will rotate the public and private cert of a particular node.

✅ Checklist

All PRs must tick these:

With occasional exceptions, all PRs from Progress employees must tick these:

  • Is the code clear? (complicated code or lots of comments--subdivide and use well-named methods, meaningful variable names, etc.)
  • Consistency checked? (user notifications, user prompts, visual patterns, code patterns, variable names)
  • Repeated code blocks eliminated? (adapt and reuse existing components, blocks, functions, etc.)
  • Spelling, grammar, typos checked? (at a minimum use make spell in any component directory)
  • Code well-formatted? (indents, line breaks, etc. improve rather than hinder readability)

All PRs from Progress employees should tick these if appropriate:

  • Tests added/updated? (all new code needs new tests)
  • Docs added/updated? (all customer-facing changes)

Please add a note next to any checkbox above if you are NOT ticking it.

📷 Screenshots, if applicable

Screenshot 2022-11-15 at 1 37 11 PM

Video Link: https://progresssoftware-my.sharepoint.com/:v:/g/personal/ssanju_progress_com/EaVG1j_QkelLteu4DZPAdcIB3V_eJmiq1zb9UtmI6qn6BQ?e=pcmfCp

Signed-off-by: “SanjuPal01” <sanju.sanju@progress.com>
@netlify
Copy link

netlify bot commented Nov 15, 2022

👷 Deploy Preview for chef-automate processing.

Name Link
🔨 Latest commit 04f43eb
🔍 Latest deploy log https://app.netlify.com/sites/chef-automate/deploys/637348e0cca4f400085f2fc9

@sonarcloud
Copy link

sonarcloud bot commented Nov 15, 2022

SonarCloud Quality Gate failed.    Quality Gate failed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 2 Code Smells

9.5% 9.5% Coverage
0.0% 0.0% Duplication

Copy link
Collaborator

@punitmundra punitmundra left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Dmaddu
Copy link
Collaborator

Dmaddu commented Nov 15, 2022

@punitmundra The pipeline got failed due to this PR #7535
And the same is failing in the main branch as well. Not due to this PR.

CC: @SanjuPal01 @Sahiba3108

@Dmaddu Dmaddu merged commit 7432187 into main Nov 15, 2022
@Dmaddu Dmaddu deleted the kinetics-232/cert-rotate-each-OS-certs branch November 15, 2022 10:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants