You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/kafka/pages/usage-guide/security.adoc
+5
Original file line number
Diff line number
Diff line change
@@ -22,12 +22,16 @@ spec:
22
22
serverSecretClass: tls # <1>
23
23
internalSecretClass: kafka-internal-tls # <2>
24
24
brokers:
25
+
config:
26
+
requestedSecretLifetime: 7d # <3>
25
27
roleGroups:
26
28
default:
27
29
replicas: 3
28
30
----
29
31
<1> The `spec.clusterConfig.tls.serverSecretClass` refers to the client-to-server encryption. Defaults to the `tls` secret. Can be deactivated by setting `serverSecretClass` to `null`.
30
32
<2> The `spec.clusterConfig.tls.internalSecretClass` refers to the broker-to-broker internal encryption. This must be explicitly set or defaults to `tls`. May be disabled by setting `internalSecretClass` to `null`.
33
+
<3> The lifetime for autoTls certificates generated by the secret operator.
34
+
Only a lifetime up to the `maxCertificateLifetime` setting in the SecretClass is applied.
31
35
32
36
The `tls` secret is deployed from the xref:secret-operator:index.adoc[Secret Operator] and looks like this:
33
37
@@ -46,6 +50,7 @@ spec:
46
50
name: secret-provisioner-tls-ca
47
51
namespace: default
48
52
autoGenerate: true
53
+
maxCertificateLifetime: 15d
49
54
----
50
55
51
56
You can create your own secrets and reference them e.g. in the `spec.clusterConfig.tls.serverSecretClass` or `spec.clusterConfig.tls.internalSecretClass` to use different certificates.
0 commit comments