You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Requirement - what kind of business use case are you trying to solve?
I want to use certificate provisioning and management from the OpenShift Elasticsearch operator. This feature reduces code in Jaeger operator and allows using a single ES cluster with multiple jaeger collectors.
An explicit installation at the moment could look like this. First provision ES and then Jaeger:
The certs are provisioned by ES operator and Jaeger operator just injects them. However, this should be fully automated so let's have a look how it could look like.
Proposal - what do you suggest to solve the problem or improve the existing situation?
Action items:
remove cert_generation script
add spec.storage.elasticsearch.name which points to the ES instance. The default name is elasticsearch
add spec.storage.elasticsearch.provision - decides whether ES instance should be provisioned or not. Defaults to true
The ES is provisioned if spec.storage.elasticsearch.provision=true and options.es.server-urls is not defined. The ES CR name is used from spec.storage.elasticsearch.name. It will use logging.openshift.io/elasticsearch-cert.jaeger-<elasticsearch-name>: user.jaeger to create Jaeger ES certificate.
If options.es.server-urls is missing and spec.storage.elasticsearch.provision=false Jaeger operator uses ES instance from spec.storage.elasticsearch.name to connect to the ES. In this case Jaeger operator will have to watch changes on ES Kind to adjust shards and replicas in Jaeger. It will use logging.openshift.io/elasticsearch-cert.jaeger-<elasticsearch-name>: user.jaeger for Jaeger ES certificate.
Upgrade
The existing Jaeger instances with self-provisioned ES will have to keep working.
Jaeger operator right now creates <instance-name>-jaeger-elasticsearch secret with user.jaeger.key, user.jaeger.crt and ca.crt. which differs from EO created secret (name is configurable via annotation logging.openshift.io/elasticsearch-cert.<name>: user.jaeger) tls.key, tls.crt and ca-bundle.crt.
The upgrade procedure will have to upgrade storage TLS config es.tls.* to point to the new files.
The text was updated successfully, but these errors were encountered:
Requirement - what kind of business use case are you trying to solve?
I want to use certificate provisioning and management from the OpenShift Elasticsearch operator. This feature reduces code in Jaeger operator and allows using a single ES cluster with multiple jaeger collectors.
An explicit installation at the moment could look like this. First provision ES and then Jaeger:
The certs are provisioned by ES operator and Jaeger operator just injects them. However, this should be fully automated so let's have a look how it could look like.
Proposal - what do you suggest to solve the problem or improve the existing situation?
Action items:
cert_generation
scriptspec.storage.elasticsearch.name
which points to the ES instance. The default name iselasticsearch
spec.storage.elasticsearch.provision
- decides whether ES instance should be provisioned or not. Defaults totrue
The ES is provisioned if
spec.storage.elasticsearch.provision=true
andoptions.es.server-urls
is not defined. The ES CR name is used fromspec.storage.elasticsearch.name
. It will uselogging.openshift.io/elasticsearch-cert.jaeger-<elasticsearch-name>: user.jaeger
to create Jaeger ES certificate.If
options.es.server-urls
is missing andspec.storage.elasticsearch.provision=false
Jaeger operator uses ES instance fromspec.storage.elasticsearch.name
to connect to the ES. In this case Jaeger operator will have to watch changes on ES Kind to adjust shards and replicas in Jaeger. It will uselogging.openshift.io/elasticsearch-cert.jaeger-<elasticsearch-name>: user.jaeger
for Jaeger ES certificate.Upgrade
The existing Jaeger instances with self-provisioned ES will have to keep working.
Jaeger operator right now creates
<instance-name>-jaeger-elasticsearch
secret withuser.jaeger.key
,user.jaeger.crt
andca.crt
. which differs from EO created secret (name is configurable via annotationlogging.openshift.io/elasticsearch-cert.<name>: user.jaeger
)tls.key
,tls.crt
andca-bundle.crt
.The upgrade procedure will have to upgrade storage TLS config
es.tls.*
to point to the new files.The text was updated successfully, but these errors were encountered: