Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Internode encryption should support cert-manager for secret management #136

Open
burmanm opened this issue Jul 9, 2021 · 5 comments
Open
Labels
assess Issues in the state 'assess' enhancement New feature or request zh:Assess/Investigate

Comments

@burmanm
Copy link
Contributor

burmanm commented Jul 9, 2021

What is missing?
Like we modified the webhooks secret handling, we should also allow simplified management for internode encryption certificates. This might only require some documentation and test changes.

Why do we need it?
The internode encryption is a requested feature, but somewhat complicated and fragile in the current version.

┆Issue is synchronized with this Jira Story by Unito
┆Issue Number: CASS-58

@burmanm burmanm added the enhancement New feature or request label Jul 9, 2021
@sync-by-unito sync-by-unito bot changed the title Internode encryption should support cert-manager for secret management K8SSAND-688 ⁃ Internode encryption should support cert-manager for secret management Apr 4, 2022
@bradfordcp
Copy link
Member

What would the estimate be if we limit the cluster to a single certificate for all pods?

@bradfordcp
Copy link
Member

Hey team! Please add your planning poker estimate with ZenHub @burmanm @Miles-Garnsey @jsanda

@Miles-Garnsey
Copy link
Member

AFAIK, we already support cert-manager for secrets management. There is just a hitch when it comes to rotating the certs.

I think any additional tests should probably be implemented under the heading of the cert-rotation work.

@jsanda
Copy link
Contributor

jsanda commented Jun 13, 2022

We use cert-manage with the webhooks, but there is work to be done to be able to use it for internode encryption.

@Miles-Garnsey
Copy link
Member

To simply enable encryption is relatively straightforward, however getting rotation working is a much more substantial piece of work. I've provided a revised estimate of 15 days to make sure rotation occurs without downtime. I think this estimate will be pretty fuzzy and we'd want this to become an epic with more precise estimates under each item.

One problem here lies in differences between DSE, Cassandra 3.x and Cassandra 4.x which will need to be catered to.

@adejanovski adejanovski moved this to Assess/Investigate in K8ssandra Nov 8, 2022
@adejanovski adejanovski added the assess Issues in the state 'assess' label Sep 3, 2024
@sync-by-unito sync-by-unito bot changed the title K8SSAND-688 ⁃ Internode encryption should support cert-manager for secret management Internode encryption should support cert-manager for secret management Oct 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
assess Issues in the state 'assess' enhancement New feature or request zh:Assess/Investigate
Projects
No open projects
Status: Assess/Investigate
Development

No branches or pull requests

5 participants