Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add CRD to control DISABLE/ENABLE automatic creation of SSL-certificate of Operator or CertManager. #1758

Open
sunguck opened this issue Dec 17, 2024 · 0 comments

Comments

@sunguck
Copy link

sunguck commented Dec 17, 2024

Proposal

Operator will create SSL-Certificate when there's no user-provided SSL Certificate.
https://github.com/percona/percona-server-mongodb-operator/blob/v1.18.0/pkg/controller/perconaservermongodb/ssl.go#L84-L101

But, sometimes we may lost AWS Secret which provides SSL certificates like following situations.

  • Lost access privileges during EKS upgrade (sometimes) or other maintnance task
  • Delete AWS Secret user's operation faults
  • ...

At this time, Operator creates Manual-certificate or CertManger's automatic certificates and restart all mongodb pods to apply new certificates. and then application can not access mongodb because CA certificate is not matched.
Usually Operator manages a lots of mongodb clusters, this side-effect affect too many mongodb clusters.
I think this is too risky to use production mongodb cluster. And user-secret too (because we manage users and ssl & sslInternal via AWS secret)

So I suggest that CRD support property to control ENABLE or DISABLE CREATING NEW SSL CERTIFICATE AUTOMATICALLY.

Use-Case

Even if operator can not fetch AWS secret,
Operator will not deploy newly auto-created ssl and remain previous user-created SSL.

So applicaitons can access mongodb server.
And after found issues DBA manage operator can access AWS secret without any service issues.

Is this a feature you are interested in implementing yourself?

Maybe

Anything else?

Thanks for percona-server-mongodb-operator.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant