-
Notifications
You must be signed in to change notification settings - Fork 420
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add init container for updating ca trust and shift getting ca cert from secret to config map #3763
Conversation
…om secret to config map
676e6ca
to
e351e6b
Compare
This is looking good to me. Tested with custom secret name. Will ping customer and merge after we get feedback. |
But why a secret? Root certificates aren't sensitive. |
@chipzoller The user requested it to be a secret as they store/retrieve certs as secrets internally. |
Then maybe make this so it accepts a Secret or ConfigMap? |
sure, we should do that. let me get that in. |
Future TODO. This updates the CA trust and certificates for the cost-analyzer pod. But it's likely that users would need to perform the same updates across other pods like the aggregator and cloudcost pod. |
@mittal-ishaan great work here. Thanks for all of the iterations while we figured out the best approach. Agree with Thomas that we should add to aggregator and cloud cost when you have a moment. I'm now questioning if we should have put this under a more general section instead of nesting under @chipzoller and @thomasvn what are your thoughts? |
Yes! I like the idea of doing |
Also agree that I'd try and pull this out and generalize it, but I'm not sure the root level is the best place. You guys have any other suggestions for where these values may best go? |
Only other place that seems suitable is under |
I'm thinking |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks good to me. These configs are now available under .Values.global.updateCaTrust
.
Approving for immediate merge so fixes are available to customer. However we now need a follow-up PR to make similar changes to the Kubecost Aggregator and Kubecost CloudCost pods, then test those changes.
Thanks Thomas. great work here team. |
Co-authored-by: Thomas Nguyen <[email protected]>
/cherry-pick v2.5 |
Cherry-pick failed with |
…om secret to config map (#3763)
What does this PR change?
Taken reference from https://jfrog.com/help/r/artifactory-how-to-add-custom-ssl-certificates-to-an-artifactory-pod-using-helm-charts/artifactory-how-to-add-custom-ssl-certificates-to-an-artifactory-pod-using-helm-charts
Does this PR rely on any other PRs?
#3760
How does this PR impact users? (This is the kind of thing that goes in release notes!)
Users will now not need to run update-ca-trust command inside the container. The init container will do it.
Links to Issues or tickets this PR addresses or fixes
What risks are associated with merging this PR? What is required to fully test this PR?
How was this PR tested?
Deployed the kubecost deployment with
caCertsSecret
helm value set and ca cert as Secret created.reading through
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
we see it updated with the given ca cert in Secret.helm values:
Have you made an update to documentation? If so, please provide the corresponding PR.