-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Internode encryption should support cert-manager for secret management #136
Comments
What would the estimate be if we limit the cluster to a single certificate for all pods? |
Hey team! Please add your planning poker estimate with ZenHub @burmanm @Miles-Garnsey @jsanda |
AFAIK, we already support cert-manager for secrets management. There is just a hitch when it comes to rotating the certs. I think any additional tests should probably be implemented under the heading of the cert-rotation work. |
We use cert-manage with the webhooks, but there is work to be done to be able to use it for internode encryption. |
To simply enable encryption is relatively straightforward, however getting rotation working is a much more substantial piece of work. I've provided a revised estimate of 15 days to make sure rotation occurs without downtime. I think this estimate will be pretty fuzzy and we'd want this to become an epic with more precise estimates under each item. One problem here lies in differences between DSE, Cassandra 3.x and Cassandra 4.x which will need to be catered to. |
What is missing?
Like we modified the webhooks secret handling, we should also allow simplified management for internode encryption certificates. This might only require some documentation and test changes.
Why do we need it?
The internode encryption is a requested feature, but somewhat complicated and fragile in the current version.
┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: CASS-58
The text was updated successfully, but these errors were encountered: