Replies: 2 comments 4 replies
-
I'm not sure I follow. There is no assumption that users using their own Clients CA will not use it to issue new user certificates through Strimzi. You can simply provide your own Clients CA and use the User Operator to manage the user TLS certificates using it. It might be your use-case that you don't plan to do it. But it might not apply to everyone and it is not a general rule. That is why there is also no logic to ignore the missing secret with the Clients CA private key. |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Suggestion / Problem
In section 9.1.2 Installing your own CA certificates, of Configuring Strimzi (0.32.0) and section 9.2.2 Secrets generated by the Cluster Operator, of Configuring Strimi (in development) (which is referenced from section 9.8.1 Installing your own CA certificates and private keys), there are references to:
which is stated as being one of the secrets created to store the certificates when generated by the Cluster Operator.
However, I believe that in the instructions to install your own CA certificates, there needs to be a separate section for each of cluster CA and clients CA to clarify that yes, both private key and certs are required for cluster CA as Strimzi and Kafka components use the private key to sign server certificates, but for clients CA if using your own CA, the private key is not used for signing new user certificates for mTLS authentication when connecting to Kafka brokers (because they are provided already, externally to Kafka).
Documentation Link
I believe the updates are required to section 9.8.1 Installing your own CA certificates and private keys, of Configuring Strimi (in development):
and section 9.2.2 Secrets generated by the Cluster Operator, of Configuring Strimi (in development):
Additonal Notes
I haven't used this mechanism to know whether Kafka can ignore <cluster_name>-clients-ca if your own CA for client mTLS is supplied? This comment suggests a dummy value needs to be inserted.
Perhaps further to the proposed changes here, there is a requirement to allow Kafka to ignore an absence of <cluster_name>-clients-ca secret if
Kafka.spec.clientsCa.generateCertificateAuthority = false
? (Or maybe you can confirm this is already the case and update the documentation to reflect this?)Thanks,
Matt
Beta Was this translation helpful? Give feedback.
All reactions