Replies: 3 comments 7 replies
-
You can configure your custom cluster CA - the operator will take it and use it to create the server keys. There is a work-in-progress proposal to make it more pluggable and allow you to integrate your certifcate management: strimzi/proposals#46 In theory, if you create the right secrets with the right certificates (including the right SANs etc.), the operator would just re-use them. But it is not documented, so you would need to reverse engineer it. |
Beta Was this translation helpful? Give feedback.
-
Hi @scholzj , You describe my problem: we cannot expose the ClusterCA key from our Vault, this is not according to our security policy, so we would like to give certificates generated by our certificate management to the Operator... the proposal you linked seems to be interesting, will check on it. Another question popped up: The documentation says this: "Providing Kafka listener certificates for external listeners allows you to leverage existing security infrastructure, such as your organization’s private CA or a public CA. Kafka clients will connect to Kafka brokers using Kafka listener certificates rather than certificates signed by the cluster CA or clients CA." Isn't this contradicts what is the written in the next statement: "This procedure shows how to configure a listener to use your own private key and server certificate, called a Kafka listener certificate." So listener certificates are server certificates, it has nothing to do which certificates the clients connect with... or am I missing something? Or can I specify a per-listener clientCA? Or this sentence is talking about plain-TLS and not mutual TLS? To me "connecting" with a certificate means the client certificate, since that is what a client sends. |
Beta Was this translation helpful? Give feedback.
-
Facing the same scenario, but I am starting at a more basic level - namely without Vault storing a CA, but in stead using I would like to use the clientCA and the clusterCA in stead of the Strimzi auto-generated ones thereafter, but only could find docs related to replacing CA, not bootstrapping the Will try to reverse engineer, but also noticed: #929 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
We would like to completely use our proprietary custom PKI infrastructure for everything Strimzi-related, both clusterCA, clientsCA, and derived certificates would be made by our PKI infra Pod.
I have not found any way in the documentation to set the internally used certificates (cluster-CA-issued) by Strimzi, I only have found how to replace the cluster-CA itself.
This is however doable in case of clients-CA: I can make the whole clients-PKI external.
Is it possible for the cluster-CA as well, or not at all?
I have seen that the Operator would like to export the clusterCA+key, and I presume the certificate creation will be fully internal after that.
Beta Was this translation helpful? Give feedback.
All reactions