-
Notifications
You must be signed in to change notification settings - Fork 500
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User friendly TLS management mechanism #3581
Comments
@AstroProfundis @tennix Could you please share some information on why we changed from the operator managed TLS solution to the current solution last year? |
Some reasons that changed from the operator managed TLS solution to the current solution:
|
@dragonly Have you tried using cert-manager? It nearly becomes the defacto certificate management tool in k8s world. It can rotate certificates automatically before expiration.
How should tidb-operator manage the certificates? Using cert-manager or the k8s builtin CA to sign certificate? Besides, are there any users requesting this feature or just our own pain point for testing when developing tidb-operator? |
Yes, and I am not saying that we should do this in TiDB Operator, but call/use cert-manager to do the hard work.
One possible solution is to utilize cert-manager.
Currently this is not a user request, so I just want to post an issue and gather some thoughts about the TLS management feature. |
Feature Request
A more user friendly TLS management mechanism.
Is your feature request related to a problem? Please describe:
Now TiDB Operator supports enabling TLS between cluster components and TLS for MySQL clients, which is basically enough.
But the current feature requires users to manually generate/manage CA and all sorts of certs/configs, which will easily become a mess in real-world production scenario.
Moreover, it's now very troublesome to rotate the server certs when it's near to expiration. Manually rotating certs requires careful operations and rolling updates, and any human mistake can take down the whole cluster, which will make service unavailable.
Describe the feature you'd like:
An all-managed-by-operator way of using TLS in TiDB clusters.
Users can also turn this off and manually manage the TLS certs.
Describe alternatives you've considered:
Manual management as in the current situation, which is BAD.
Teachability, Documentation, Adoption, Migration Strategy:
TBD.
The text was updated successfully, but these errors were encountered: