Use existing ETCD and Kubernetes CA certificates #463
Replies: 3 comments 4 replies
-
I spent the whole holiday trying to find a solution to this. However, it would be cool and helpful to have a proper user story, along with the tools and some examples used to achieve the offloading of the certificates to a third party. What we could introduce from Kamaji's standpoint is a knob, potentially an annotation on the @log1cb0mb it would be cool if you could provide further details about it, such as skipping all the certificates checksum checks, or making it fine-grained: again, it's a use-case particular, we're open to getting this implemented, we need to gather more details and a user-story would be really helpful. |
Beta Was this translation helpful? Give feedback.
-
Any update on this please ? this is something very important for us @log1cb0mb |
Beta Was this translation helpful? Give feedback.
-
How about... User StoryImport Existing In-House PKI Certificates and etcd Datastore into KamajiAs a Kubernetes cluster administrator, I want to import the TLS certificates from my in-house Public Key Infrastructure (PKI) and the existing etcd datastores from my three current Kubernetes clusters into Kamaji, so that I can seamlessly migrate my existing clusters to Kamaji’s hosted control plane management without regenerating certificates or losing critical cluster state data, reducing operational overhead and maintaining continuity. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Ability to allow users to provide an existing CA certificate for both ETCD and Kubernetes in the form of a secret containing content however Kamaji expects it to be.
Current behaviour seems to be that ETCD CA is pretty much hard coded and is utilised during etcd datastore bootstrap.
TCP does allow reusing existing secret (named exactly what TCP specs expect) containing CA certificate but due to Kamaji controller not maintaining checksums for the secret containing CA certificate, reconciliation keeps triggering deletion of existing secret. In case the secret is not available by the time Kamaji controller gets to the phase of using it, it generates its own CA certificate.
This would be a helpful feature:
Beta Was this translation helpful? Give feedback.
All reactions