Custom CA cert renewal #11115
-
Hello, as step 1 I created custom CA as described in https://github.com/scholzj/strimzi-custom-ca-test for my strimzi clusteru (lets call it "source cluster"). Everything works fine, but now i need to expose the certificate using OpenShift's route in order to back the up in another cluster using mirror maker2. In order to do this I need to register a new SAN into source cluster. In order to do that I took the original intermediate pem/key (
Config for new certificate is and created a new secrets with updated strimzi.io/ca-key-generation annotation:
After applying these updated secrets, the operator starts to restart pod with kafka broker. But it fails with Is this approach correct, or am i doing something wrong? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
SANs have nothing to do with the CAs. They are in the server certificates. If you need to add new SANs to the server certificates, you can do it for example this way: https://strimzi.io/docs/operators/latest/full/configuring.html#property-listener-config-altnames-reference. But the Route names should already be part of the SANs if you use |
Beta Was this translation helpful? Give feedback.
SANs have nothing to do with the CAs. They are in the server certificates. If you need to add new SANs to the server certificates, you can do it for example this way: https://strimzi.io/docs/operators/latest/full/configuring.html#property-listener-config-altnames-reference. But the Route names should already be part of the SANs if you use
type: route
.