-
Notifications
You must be signed in to change notification settings - Fork 729
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically inject service external IP to the certs SAN #910
Labels
Comments
Why would someone not want this? |
A few things we discussed in today's sync meeting:
|
I would argue for making this default behavior if the http type is 'LoadBalancer'. This is especially useful for users who will try the Operator on managed Kubernetes services like GKE. Regarding some of the bullet-points above:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
When users expose the ES cluster through
http.service.type
, they're hitting a cert validity issue while requesting the cluster:It's expected, since the external IP is never injected into ES certs SANs.
The workaround currently is for users to manually inject that IP into the Elasticsearch Spec:
cloud-on-k8s/operators/config/samples/elasticsearch/elasticsearch.yaml
Lines 46 to 51 in 5a8a8a3
We should be able to inject that IP automatically, and reconcile on any IP change.
Do we need a way for this to be an opt-in/opt-out feature, or is it OK to just enforce it?
The text was updated successfully, but these errors were encountered: