You are looking at the documentation of a prior release. To read the documentation of the latest release, please visit here.

New to KubeDB? Please start here.

Reconfiguring TLS of Memcached Database

This guide will give an overview on how KubeDB Ops-manager operator reconfigures TLS configuration i.e. add TLS, remove TLS, update issuer/cluster issuer or Certificates and rotate the certificates of a Memcached database.

Before You Begin

How Reconfiguring Memcached TLS Configuration Process Works

The following diagram shows how KubeDB Ops-manager operator reconfigures TLS of a Memcached database. Open the image in a new tab to see the enlarged version.

  Reconfiguring TLS process of Memcached
Fig: Reconfiguring TLS process of Memcached

The Reconfiguring Memcached TLS process consists of the following steps:

  1. At first, a user creates a Memcached Custom Resource (CR).

  2. KubeDB Community operator watches the Memcached CR.

  3. When the operator finds a Memcached CR, it creates required number of PetSets and related necessary stuff like appbinding, services, etc.

  4. Then, in order to reconfigure the TLS configuration of the Memcached database the user creates a MemcachedOpsRequest CR with the desired version.

  5. KubeDB Enterprise operator watches the MemcachedOpsRequest CR.

  6. When it finds a MemcachedOpsRequest CR, it halts the Memcached object which is referred from the MemcachedOpsRequest. So, the KubeDB Community operator doesn’t perform any operations on the Memcached object during the reconfiguring process.

  7. By looking at the target version from MemcachedOpsRequest CR, KubeDB Enterprise operator will add, remove, update or rotate TLS configuration based on the Ops Request yaml.

  8. After successfully reconfiguring Memcached object, the KubeDB Enterprise operator resumes the Memcached object so that the KubeDB Community operator can resume its usual operations.

In the next doc, we are going to show a step-by-step guide on updating of a Memcached database using update operation.