You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When connecting to services that use TLS with certificates signed by a private CA (e.g., internal Elasticsearch, Kafka, or databases), you can use the `ca-cert` option to add the CA certificate to the JVM's truststore.
125
+
When connecting to services that use TLS with certificates signed by a private CA (e.g., internal Elasticsearch, Kafka, or databases), you can use the `ca-certificates` option to add CA certificates to the JVM's truststore.
126
+
127
+
=== Single Certificate
122
128
123
129
First, create Kubernetes Secrets containing the CA certificate and truststore password:
124
130
@@ -135,25 +141,66 @@ Then mount the secrets using the mount trait and reference the file paths:
NOTE: When using `base-truststore`, you can optionally provide `truststore-password-path` to set a different password for the output truststore. If not provided, the base truststore password is used.
178
+
179
+
=== Truststore Password Resolution
180
+
181
+
The truststore password is determined using this priority:
0 commit comments