New to KubeDB? Please start here.
Reconfiguring TLS of FerretDB
This guide will give an overview on how KubeDB Ops-manager operator reconfigures TLS configuration i.e. add TLS, remove TLS, update issuer/cluster issuer or Certificates and rotate the certificates of a FerretDB.
Before You Begin
- You should be familiar with the following
KubeDBconcepts:
How Reconfiguring FerretDB TLS Configuration Process Works
The following diagram shows how KubeDB Ops-manager operator reconfigures TLS of a FerretDB. Open the image in a new tab to see the enlarged version.
The Reconfiguring FerretDB TLS process consists of the following steps:
At first, a user creates a
FerretDBCustom Resource Object (CRO).KubeDBProvisioner operator watches theFerretDBCRO.When the operator finds a
FerretDBCR, it createsPetSetand related necessary stuff like secrets, services, etc.Then, in order to reconfigure the TLS configuration of the
FerretDBthe user creates aFerretDBOpsRequestCR with desired information.KubeDBOps-manager operator watches theFerretDBOpsRequestCR.When it finds a
FerretDBOpsRequestCR, it pauses theFerretDBobject which is referred from theFerretDBOpsRequest. So, theKubeDBProvisioner operator doesn’t perform any operations on theFerretDBobject during the reconfiguring TLS process.Then the
KubeDBOps-manager operator will add, remove, update or rotate TLS configuration based on the Ops Request yaml.Then the
KubeDBOps-manager operator will restart all the Pods of the ferretdb so that they restart with the new TLS configuration defined in theFerretDBOpsRequestCR.After the successful reconfiguring of the
FerretDBTLS, theKubeDBOps-manager operator resumes theFerretDBobject so that theKubeDBProvisioner operator resumes its usual operations.
In the next docs, we are going to show a step-by-step guide on reconfiguring TLS configuration of a FerretDB using FerretDBOpsRequest CRD.































