-
Notifications
You must be signed in to change notification settings - Fork 344
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is Jaeger restart required after change to cert generation script? #1011
Comments
I have also tested one additional scenario that involves changing Elasticsearch CR to trigger the reconciliation loop. I have changed the number of nodes from |
For cluster logging, CLO is responsible for updating the secrets -- which will only be different if the contents of the certs has changed. The script itself doesn't change the certs unless the signing CA has expired or if the signing CA had to be regenerated. |
Thanks @ewolinetz. So, in this case, we are good and we don't have to do anything for existing deployments.
How is this use-case handled in CLO? As we are using the same script the certs do not change. In a separate issue, we should start thinking how to restart Jaeger components when certs expire or change. |
We run the script during every reconcile loop, we pull our certs down to a local dir in the operator pod, so the cert gen script can also detect if they are expired. Then we create or update our secrets every time, so if the local certs have changed then the secrets will get updated as well if necessary. |
Jaeger operator does the same. If the certs are not present on operators filesystem then the certs are extracted from secrets. Then the script is run to validate the certs (e.g. whether they are expired) I have run the diff on the certs directory before PR #1008 and after - see the first comment. There are some changed files but the core certs haven't changed e.g. |
If the certs aren't expired this is what we would expect to see.. or are you saying since the |
I think it is correct how it is handled right now. From your first comments my impressions were that new set of certs will be generated if PR #1008 is applied to existing deployments. @ewolinetz thanks for the confirmation. I am closing this and I will open a new issue for handling Jaeger restart when certs change - e.g. expire. |
Follow up from #1008 (comment)
A simple test showed that certs (
elasticsearch
andsimple-prod-jaeger-elasticsearch
) are not changed if Jaeger operand is created before the change to the script.I have done these steps to validate it:
oc create -f deploy/examples/openshift/simple-prod-deploy-es.yaml
Elasticsearch or Jaeger pods haven't been redeployed and the secrets haven't changed. I am attaching diff
diff /tmp/_certs/project1/simple-prod/cf03e514-59ac-4d4f-855b-869a0c284d45 original_certs
- new cet directory vs old one before #1008 .Diff in cert directory
diff.txt
Cmd to get secrets
cc) @ewolinetz
The text was updated successfully, but these errors were encountered: