Replies: 3 comments 17 replies
-
First of all, let's clarify what exactly you mean with
Sorry, but from your description it is not really clear what you did. Please follow the steps described here: https://strimzi.io/docs/operators/latest/full/configuring.html#installing-your-own-ca-certificates-str. If you want to move from Strimzi managed CA to your own CA, you should first configure the Kafka CR to tell the operator that you want to now use your own CA (this is the Also, keep in mind that the CA needs to be a CA => the certificate you provide needs to be marked as usable for CA purposes (but it can be just an intermediate CA, does not have to be a Root CA). From the error, it seems clear that you didn't rolled it correctly. If you are starting with a fresh cluster, you do not need to do the renewal, just do your own CA from the start.
I think that in most cases you will use either your own CA or the listener certificate. The difference is that when using your own CA, you need to provide a CA as mentioned above. And this CA is used to sign all certificates used to secure the Kafka cluster. So it is not just used for the communication between your Kafka clients and brokers. It is also used for communication between the brokers, between ZooKeeper nodes, between Kafka and ZooKeeper. So it is used for more things, but it is also more complicated. The listener certificate is much easier. You provide a server certificate which will be used for a particular listener in the Kafka broker. It does not need to be CA as it is not used to sign any additional certificates. It will be used only for communication between your clients and your Kafka brokers. |
Beta Was this translation helpful? Give feedback.
-
Am I missing any falgs? I use below command to verify or this https://www.sslshopper.com/certificate-decoder.html through the browser. openssl x509 -in ca.pem -text -noout
Yes, I am careful,, I am creating a new cluster only, not modifying the existing cluster. |
Beta Was this translation helpful? Give feedback.
-
@scholzj - A big thanks. As mentioned earlier, I tried today with the Kafka listener certificate and I am able to connect without any issues. I am going to document this here so that anyone facing the same issue can refer here. Create a CSR and key for the listener.
Sign with CA and validate
Create secret and apply Kafka CR
Validate
Create the topic
Create the trust store for the listener
Produce and consumer the message
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi Experts,
I was using the latest strimzi-operator latest version, working fine without any issues. But I have to use the custom certificate since we have our own CA. So First I started following the link and created a cluster with its own CA, which worked fine. As a next step, I did it in two parts.
First part: OWN CA change all certs
Create clients csr + strimzi csr
Signed both certificates with my own CA, and they provided my certificate + root cert + intermediate cert.
Loaded those to the secrets using script
Started the cluster -
but the operator didn't create the zookeeper node.
Second part: Kafka Listener certificate
Since the first part failed I want to try the second part, so that operator can handle the internal certificate and outside consumer/producer. I used the same YAML just commenting below lines. named it as
name: strimzi-cluster
Created the certificate with SAN.
Signed from CA.
added the root and intermediate certificates.
added below lines and updated.
Added root and intermediate certificates to the trust store.
Getting, SSL handshake
Question
Thanks
Senthil
Beta Was this translation helpful? Give feedback.
All reactions