Certs Renewal Issue #6321
Replies: 2 comments 9 replies
-
Attaching the logs: kafka_sacclusterlogs.txt |
Beta Was this translation helpful? Give feedback.
-
So, are you using your own Cluster CA certificates? Or is this with Strimzi generated CA? In the first case, the annotations should not be used at all. In the second case, if the certs are already expired, it is too late to use any Assuming the CA is now renewed, You might need to delete the secrets with the certificates manually together with the pods and have them recreated by the operator with the new CA. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi Strimzi team,
We are observing an issue recently where the cluster-ca and client-ca certs expired for a product team using Strimzi kafka operator. Post expiration of the certificates, the team tried renewing them by using the "force-renew: true" annotation method, referring to the official documentation, (https://strimzi.io/docs/operators/in-development/configuring.html#proc-renewing-ca-certs-manually-str). We are under the impression that this activity should be performed before the expiration date, while the certificates are still valid - please help to clarify if this is not the case.
Post trying this, "force-renew: true" annotation method, the kafka, entity operator and kafka-exporter pods are in crash loop back-off. Also, there is an error message in the tls-sidecar container.
"SSL_accept: 1408F10B: error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number"
The operator logs suggest that it is not able to establish a connection with zookeeper.
Please advise on how to recover the cluster in such a state.
Beta Was this translation helpful? Give feedback.
All reactions