Replies: 1 comment 2 replies
-
That is by design. It is not supposed to be the Cluster CA certificate. It is the Clients CA certificate => the public key of the CA used to sign the user certificate. Some clients might need it to be able to use the user certificate. To get the Cluster CA secret, you should get it from the cluster CA secret => |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Bug Description
the secret for a
tls
authenticatedKafkaUsers
contains the keyca.crt
with a CA certificate that is different from the kafka cluster CA certificate, and doesn't work. But using the secret<kafka-name>-cluster-ca
from the kafka's namespace works.Steps to reproduce
kafkacat
cli installedExpected behavior
topics are listed with no problem
Strimzi version
0.33.2
Kubernetes version
1.23
Installation method
Helm chart
Infrastructure
GKE
Configuration files and logs
using the CA certificate from the user's secret (generated by the userOperator) produces this error:
kafkacat -L -b "my-kafka-kafka-bootstrap.kafka.svc.cluster.local:9094" -X security.protocol=ssl -X ssl.ca.location=/tmp/ca.crt -X ssl.certificate.location=/tmp/user.crt -X ssl.key.location=/tmp/user.key
but by using the CA certificate from the
my-kafka-cluster-ca
secret in thekafka
namespace (where I deployed the kafka cluster which i calledmy-kafka
) works:kafkacat -L -b "my-kafka-kafka-bootstrap.kafka.svc.cluster.local:9094" -X security.protocol=ssl -X ssl.ca.location=/tmp/ca.cluster.crt -X ssl.certificate.location=/tmp/user.crt -X ssl.key.location=/tmp/user.key
Additional context
No response
Beta Was this translation helpful? Give feedback.
All reactions