-
I've got a "fun" one. My client just transitioned to a complete new CA (from root on down) and now I have to support tls-external Kafka Users from 2 different CAs for the next year or so. I tried concatenating both chains in the same file and creating a new secret with that file for ca.crt (I was 99.99% sure this would fail, but had to try...). Brokers came back up, but I got SSL transport errors from my clients. I tried creating the CLUSTER-NAME-clients-ca-cert with ca.p12 and ca.password, per the documentaton , with all the CAs from both chains in the keystore, but the brokers failed to come up with the following error: I have 5 CA public keys in my keystore:
Hopefully I am just missing something, but has anyone tried to support multiple custom client CAs? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 10 replies
-
The operator does not use the PKCS12 file. So it should not matter what you have there. It creates its own PKCS12 store inside the container from the CRT files. In general, we do not support multiple trust chains. You can try to add them to the |
Beta Was this translation helpful? Give feedback.
The operator does not use the PKCS12 file. So it should not matter what you have there. It creates its own PKCS12 store inside the container from the CRT files. In general, we do not support multiple trust chains. You can try to add them to the
...-clients-ca-cert
secret as CRT files with different suffixes. E.g.ca.crt
,ca-2.crt
. That might work. But it is not something we test for this use-case. This is what is normally used when the CA private key is replaced.