-
Notifications
You must be signed in to change notification settings - Fork 344
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS trust store for kafka/storage and oauth #1043
Labels
needs-info
We need some info from you! If not provided after a few weeks, we'll close this issue.
Comments
I think there are parts to this issue:
|
@jpkrohling Would you be able to comment on this one? |
I'm probably missing something really obvious, but:
|
jpkrohling
added
needs-info
We need some info from you! If not provided after a few weeks, we'll close this issue.
and removed
needs-triage
New issues, in need of classification
labels
Sep 10, 2020
Looks good, I think so. I don't have time to verify now, but I think this issue can be closed. |
Alright, feel free to reopen if there's something missing. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
needs-info
We need some info from you! If not provided after a few weeks, we'll close this issue.
The OpenShift API server, kafka and elasticsearch TLS certificates can be issued by other CA (public or private company CA) in some deployments. This is currently not supported.
In OpenShift, it is possible to request a TLS trust bundle injected into a configMap, see https://docs.openshift.com/container-platform/4.3/networking/configuring-a-custom-pki.html
Possible fix
Producer/consumer config
It might be possible to mount it over the existing TLS trust bundle to avoid custom paths like /etc/trust in this example. I did this for the oauth2-sidecar:
Oauth config/query
The text was updated successfully, but these errors were encountered: