New to KubeDB? Please start here.
Rotate Authentication of Hazelcast
This guide will give an overview on how KubeDB Ops-manager operator Rotate Authentication configuration.
Before You Begin
- You should be familiar with the following
KubeDBconcepts:
How Rotate Hazelcast Authentication Configuration Process Works
The following diagram shows how KubeDB Ops-manager operator Rotate Authentication of a Hazelcast. Open the image in a new tab to see the enlarged version.
The Rotate Hazelcast Authentication process consists of the following steps:
At first, a user creates a
HazelcastCustom Resource Object (CRO).KubeDBProvisioner operator watches theHazelcastCRO.When the operator finds a
HazelcastCR, it creates required number ofPetSetsand related necessary stuff like secrets, services, etc.Then, in order to rotate the authentication configuration of the
Hazelcast, the user creates aHazelcastOpsRequestCR with desired information.KubeDBOps-manager operator watches theHazelcastOpsRequestCR.When it finds a
HazelcastOpsRequestCR, it pauses theHazelcastobject which is referred from theHazelcastOpsRequest. So, theKubeDBProvisioner operator doesn’t perform any operations on theHazelcastobject during the rotating Authentication process.Then the
KubeDBOps-manager operator will update necessary configuration based on the Ops Request yaml to update credentials.Then the
KubeDBOps-manager operator will restart all the Pods of the database so that they restart with the new authenticationENVsor other configuration defined in theHazelcastOpsRequestCR.After the successful rotating of the
HazelcastAuthentication, theKubeDBOps-manager operator resumes theHazelcastobject so that theKubeDBProvisioner operator resumes its usual operations.
In the next docs, we are going to show a step by step guide on rotating Authentication configuration of a Hazelcast using HazelcastOpsRequest CRD.































