TLS Certificates for Aerospike on Kubernetes
To set up a TLS-enabled Aerospike cluster, first use kubectl to create a Kubernetes Secret containing the TLS certificates and key.
-
Run the following command to create a Secret from the contents of the
config/samples/secrets
folder:Terminal window kubectl create secret generic aerospike-secret --from-file=config/samples/secrets -n aerospikeSee the Aerospike documentation for more details on Aerospike TLS configuration.
-
Add the TLS-specific configuration to the Aerospike cluster’s CR file. Modify the
aerospikeConfig.network
stanza as shown in the following example:storage:filesystemVolumePolicy:cascadeDelete: trueinitMethod: deleteFilesvolumes:- name: workdiraerospike:path: /opt/aerospikesource:persistentVolume:storageClass: ssdvolumeMode: Filesystemsize: 1Gi- name: nsaerospike:path: /opt/aerospike/datasource:persistentVolume:storageClass: ssdvolumeMode: Filesystemsize: 3Gi- name: aerospike-config-secretsource:secret:secretName: aerospike-secretaerospike:path: /etc/aerospike/secretaerospikeConfig:service:feature-key-file: /etc/aerospike/secret/features.confsecurity: {}network:service:tls-name: aerospike-a-0.test-runnertls-authenticate-client: anytls-port: 4333heartbeat:tls-name: aerospike-a-0.test-runnertls-port: 3012fabric:tls-name: aerospike-a-0.test-runnertls-port: 3011tls:- name: aerospike-a-0.test-runnercert-file: /etc/aerospike/secret/svc_cluster_chain.pemkey-file: /etc/aerospike/secret/svc_key.pemca-file: /etc/aerospike/secret/cacert.pemFor the full CR file, see the example TLS cluster CR.
This and other example CRs are available in the main Aerospike Kubernetes Operator repository.
-
Save and exit the file, then use
kubectl
to apply the change.Terminal window kubectl apply -f aerospike-cluster.yaml
Rotate TLS certificates
To change the TLS certificate:
-
Update the TLS file(s) that contain the certificates and keys. Use the same filename(s) you originally added to the
secrets
folder. -
Update the Secret from that folder with the command:
Terminal window kubectl create secret generic aerospike-secret --from-file=. -n aerospike --dry-run=client -o yaml | kubectl apply -f -
Kubernetes automatically syncs Secrets and config maps on the pods at regular intervals as described here in the official Kubernetes documentation. After Kubernetes syncs the Secret with the pod, Aerospike Server picks up the new TLS certificates and uses them for newer connections created from that point on.