You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
But, sometimes we may lost AWS Secret which provides SSL certificates like following situations.
Lost access privileges during EKS upgrade (sometimes) or other maintnance task
Delete AWS Secret user's operation faults
...
At this time, Operator creates Manual-certificate or CertManger's automatic certificates and restart all mongodb pods to apply new certificates. and then application can not access mongodb because CA certificate is not matched.
Usually Operator manages a lots of mongodb clusters, this side-effect affect too many mongodb clusters.
I think this is too risky to use production mongodb cluster. And user-secret too (because we manage users and ssl & sslInternal via AWS secret)
So I suggest that CRD support property to control ENABLE or DISABLE CREATING NEW SSL CERTIFICATE AUTOMATICALLY.
Use-Case
Even if operator can not fetch AWS secret,
Operator will not deploy newly auto-created ssl and remain previous user-created SSL.
So applicaitons can access mongodb server.
And after found issues DBA manage operator can access AWS secret without any service issues.
Is this a feature you are interested in implementing yourself?
Maybe
Anything else?
Thanks for percona-server-mongodb-operator.
The text was updated successfully, but these errors were encountered:
Proposal
Operator will create SSL-Certificate when there's no user-provided SSL Certificate.
https://github.com/percona/percona-server-mongodb-operator/blob/v1.18.0/pkg/controller/perconaservermongodb/ssl.go#L84-L101
But, sometimes we may lost AWS Secret which provides SSL certificates like following situations.
At this time, Operator creates Manual-certificate or CertManger's automatic certificates and restart all mongodb pods to apply new certificates. and then application can not access mongodb because CA certificate is not matched.
Usually Operator manages a lots of mongodb clusters, this side-effect affect too many mongodb clusters.
I think this is too risky to use production mongodb cluster. And user-secret too (because we manage users and ssl & sslInternal via AWS secret)
So I suggest that CRD support property to control ENABLE or DISABLE CREATING NEW SSL CERTIFICATE AUTOMATICALLY.
Use-Case
Even if operator can not fetch AWS secret,
Operator will not deploy newly auto-created ssl and remain previous user-created SSL.
So applicaitons can access mongodb server.
And after found issues DBA manage operator can access AWS secret without any service issues.
Is this a feature you are interested in implementing yourself?
Maybe
Anything else?
Thanks for percona-server-mongodb-operator.
The text was updated successfully, but these errors were encountered: