New to KubeDB? Please start here.
FerretDB TLS/SSL Encryption
Prerequisite : To configure TLS/SSL in FerretDB
, KubeDB
uses cert-manager
to issue certificates. So first you have to make sure that the cluster has cert-manager
installed. To install cert-manager
in your cluster following steps here.
To issue a certificate, the following crd of cert-manager
is used:
Issuer/ClusterIssuer
: Issuers, and ClusterIssuers represent certificate authorities (CAs) that are able to generate signed certificates by honoring certificate signing requests. All cert-manager certificates require a referenced issuer that is in a ready condition to attempt to honor the request. You can learn more details here.Certificate
:cert-manager
has the concept of Certificates that define a desired x509 certificate which will be renewed and kept up to date. You can learn more details here.
FerretDB CRD Specification :
KubeDB uses following crd fields to enable SSL/TLS encryption in FerretDB
.
spec:
sslMode
tls:
issuerRef
certificates
cientAuthMode
Read about the fields in details from ferretdb concept,
When, sslMode
is set to require
, the users must specify the tls.issuerRef
field. KubeDB
uses the issuer
or clusterIssuer
referenced in the tls.issuerRef
field, and the certificate specs provided in tls.certificate
to generate certificate secrets using Issuer/ClusterIssuers
specification. These certificates secrets including ca.crt
, tls.crt
and tls.key
etc. are used to configure FerretDB
server, exporter etc. respectively.
How TLS/SSL configures in FerretDB
The following figure shows how KubeDB
enterprise used to configure TLS/SSL in FerretDB. Open the image in a new tab to see the enlarged version.
Deploying FerretDB with TLS/SSL configuration process consists of the following steps:
At first, a user creates a
Issuer/ClusterIssuer
cr.Then the user creates a
FerretDB
cr which refers to theIssuer/ClusterIssuer
cr that the user created in the previous step.KubeDB
Provisioner operator watches for theFerretDB
cr.When it finds one, it creates
Secret
,Service
, etc. for theFerretDB
database.KubeDB
Ops-manager operator watches forFerretDB
(5c),Issuer/ClusterIssuer
(5b),Secret
andService
(5a).When it finds all the resources(
FerretDB
,Issuer/ClusterIssuer
,Secret
,Service
), it createsCertificates
by usingtls.issuerRef
andtls.certificates
field specification fromFerretDB
cr.cert-manager
watches for certificates.When it finds one, it creates certificate secrets
tls-secrets
(server, client, exporter secrets etc.) that holds the actual certificate signed by the CA.KubeDB
Provisioner operator watches for the Certificate secretstls-secrets
.When it finds all the tls-secret, it creates the related
StatefulSets
so that FerretDB database can be configured with TLS/SSL.
In the next doc, we are going to show a step-by-step guide on how to configure a FerretDB
database with TLS/SSL.