Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use Key Vault secrets instead of cert-manager secret in AKS cluster #185

Merged
merged 5 commits into from
Feb 5, 2024

Conversation

ghidalgo3
Copy link
Contributor

Description

We can no longer use cert-manager and instead the TLS certificate used by the cluster for HTTPS calls must come from a key vault and be made available in the NGINX pods. The certificates were created manually, the changes in this PR are to update AKS to be able to use Key Vault certificates in pods.

There is some unexplained behavior with the NGINX ingress controller where it would not match hosts to TLS certs correctly and the only way to make the ingress controller use the correct cert was to set it as the default. This is not desirable, but it is working and one day will be fixed.

Fixes # (issue)

Type of change

Please delete options that are not relevant.

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)

How Has This Been Tested?

Deployed to planetarycomputer-test.microsoft.com.

Checklist:

Please delete options that are not relevant.

  • I have performed a self-review

Copy link
Contributor

@TomAugspurger TomAugspurger left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good overall.

For the jsonschema stuff, I think you'll need to either upgrade pystac or pin jsonschema. See stac-utils/pystac#1186 and linked issues.

@ghidalgo3 ghidalgo3 merged commit dcfd7c7 into main Feb 5, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants