-
Notifications
You must be signed in to change notification settings - Fork 352
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[jaeger] Cassandra TLS broken #15
Comments
While storing TLS credentials in Secret. They are stored in If your certificates are self-signed, kubernetes will not accept it and you have to pass But, if you see at Jaeger's configuration. It requires CA certificate also. This file will not be there in secret if it self-signed. So, we can't go with the idea of storing TLS credentials in secret. Correct me, If I'm wrong anywhere :) |
You can create a secret with key,crt and ca. Or if you prefer one secret for server key and crt, and another for the ca cert. Please see https://github.com/kubernetes/ingress-nginx/blob/master/docs/examples/auth/client-certs/README.md#creating-certificate-secrets for further instructions. |
One thing is for sure you will want |
Okay, we can go with secrets. We can maintain 2 secrets. This will be good |
I'm getting the following error , when enables tls , my secret is encoded with base64 and the contents is as from the example in the docs.(the secret is created with the correct name) Error: release dealing-tiger failed: Deployment.apps "cassandra-collector" is invalid: [spec.template.spec.containers[0].volumeMounts[0].name: Not found: "cassandra-tls-secret", spec.template.spec.containers[0].volumeMounts[1].name: Not found: "cassandra-tls-secret", spec.template.spec.containers[0].volumeMounts[2].name: Not found: "cassandra-tls-secret"] |
Provide your |
I saw that I'm writing in the wrong issue , my case is with cassandra as storage , we can move the conversation or I can create new one. Here is my secret as the content is base64 encoded : apiVersion: v1 client-key.pem: | ############### The chart is installed in the same namespace as the secret "jaeger". |
okay, I figured out the problem. It's with the chart. I will create PR to fix After the fix, you will need to add the config at example:
same goes for |
Great , thanks , let me know , when the fix is merged and ready to use. |
I think the schema job also needs to be fixed. |
Sorry you are experiencing this @mmpetarpeshev and thanks for looking into this @arpitjindal97. Hi @Pehesi97 As the last contributor to work on the Cassandra TLS feature, could you please comment? Does this work for you? |
cassandra schema job doesn't have TLS support How should we proceed ? I'm confused |
@arpitjindal97 according to: https://www.jaegertracing.io/docs/1.17/deployment/#tls-support
And in the chart it's here: helm-charts/charts/jaeger/templates/cassandra-schema-job.yaml Lines 83 to 86 in 2ed907e
|
Any update on the PR approval or the issue ? I tried to run the chart with changes from the PR and if I'm not in mistake with configurations or values, there is still issue with the mounts and secrets. |
Looks like #145 should fix the issue @mmpetarpeshev @arpitjindal97 PTAL |
I am getting the same error shown in comment. is it a bug in Jaeger's helm chart? I don't see volumes code if tls enable. Schema Job missing volumes block if tls enable Same with Query, Ingester, and Collector. |
Please skip to #15 (comment)
Original issue has taken a different road.
The text was updated successfully, but these errors were encountered: