Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support Keystore configuration for communicating with multiple Management API deployments #1490

Open
1 task
emerkle826 opened this issue Apr 10, 2024 · 0 comments
Labels
assess Issues in the state 'assess'

Comments

@emerkle826
Copy link
Collaborator

emerkle826 commented Apr 10, 2024

Project board link

In a centralized Reaper K8s deployment, where one Reaper instance will manage repairs for multiple Cassandra clusters spread across K8s clusters, Reaper will need to be configured to communicate with each of the Management APIs running in the Cassandra clusters. When these communication links are secured (https instead of http), Reaper will have to manage certificate/truststores/keystores for these communication links.

The Reaper pod will get every keystore/trustore pair for each cluster mounted as a separate volume.
The directory structure will look as follows:

/etc/encryption/mgmt
   |
   -- cluster1
           |
           -- keystore.jks
           |
           -- truststore.jks
   |
   -- cluster2
           |
           -- keystore.jks
           |
           -- truststore.jks

This will require a restart of the Reaper pod each time a cluster is added or removed.
The hot reloading feature that's already built in will handle refreshing the certificates on rotation.

Definition of Done

  • blabla
@adejanovski adejanovski added the assess Issues in the state 'assess' label Apr 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
assess Issues in the state 'assess'
Projects
None yet
Development

No branches or pull requests

2 participants