-
-
Notifications
You must be signed in to change notification settings - Fork 7
AutoTLS CA rotation #93
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
ping @lfrancke It would be nice to get this in the refinement and implementation queue. Not super urgent, but a low hanging fruit that I am 100% sure will become super-urgent due to customer demands at some point in time if we don't fix it before then. |
For anyone reading this later, these are the docs (nightly right now): https://docs.stackable.tech/home/nightly/secret-operator/secretclass.html#_certificate_authority_rotation |
Where is that warning generated?
It is under the CA heading but does this apply to all certificates? I think this could use an admonition of some sorts instead of being in-line. |
yes it could be a "NOTE". We don't really have any guidelines for when to use an admonition or when not to though |
Normal certificates die with the pods they were created for. Unless running in rootless mode they are only ever "stored" in ram. |
In the operator logs, currently. I can understand if we don't want to mention it to avoid overpromising, until we expose it better. |
As @soenkeliebau mentioned, we don't store pod certificates at all, outside of the temporary pod volume.
It could be, but I think it's also a relatively low priority problem for people to worry about. I don't want to overuse admonitions to the point where people become blind to them. |
Thanks!
I understand that you have a different opinion on the second but I find those things to actually help because they break up the "monotony" of long texts. |
Sure. |
As requested by @lfrancke (#93 (comment))
As requested by @lfrancke (#93 (comment))
What would a better exposure look like here? I'll be happy to create an issue for it. Random thougth that was sparked by this, should we start a list of "status stuff you should add to your alerting if you want to be informed about what we think you should do" page in the docs? |
@soenkeliebau |
Events are really short lived and would die pretty soon, so unless someone would alert on that event they might miss it.. |
Currently the CA certificates create by secret-operator are valid for two years and signed service certificates for 1 day. We should improve the lifecycle handling for TLS certificates to ensure that new certificates are minted and rotated in when required. We should also generate metrics or alerts for certificate expiration, especially for the CA.
The text was updated successfully, but these errors were encountered: