You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeDB? Please start here.
Reconfiguring TLS of FerretDB
This guide will give an overview on how KubeDB Ops-manager operator reconfigures TLS configuration i.e. add TLS, remove TLS, update issuer/cluster issuer or Certificates and rotate the certificates of a FerretDB.
Before You Begin
- You should be familiar with the following
KubeDBconcepts:
How Reconfiguring FerretDB TLS Configuration Process Works
The following diagram shows how KubeDB Ops-manager operator reconfigures TLS of a FerretDB. Open the image in a new tab to see the enlarged version.
The Reconfiguring FerretDB TLS process consists of the following steps:
At first, a user creates a
FerretDBCustom Resource Object (CRO).KubeDBProvisioner operator watches theFerretDBCRO.When the operator finds a
FerretDBCR, it createsPetSetand related necessary stuff like secrets, services, etc.Then, in order to reconfigure the TLS configuration of the
FerretDBthe user creates aFerretDBOpsRequestCR with desired information.KubeDBOps-manager operator watches theFerretDBOpsRequestCR.When it finds a
FerretDBOpsRequestCR, it pauses theFerretDBobject which is referred from theFerretDBOpsRequest. So, theKubeDBProvisioner operator doesn’t perform any operations on theFerretDBobject during the reconfiguring TLS process.Then the
KubeDBOps-manager operator will add, remove, update or rotate TLS configuration based on the Ops Request yaml.Then the
KubeDBOps-manager operator will restart all the Pods of the ferretdb so that they restart with the new TLS configuration defined in theFerretDBOpsRequestCR.After the successful reconfiguring of the
FerretDBTLS, theKubeDBOps-manager operator resumes theFerretDBobject so that theKubeDBProvisioner operator resumes its usual operations.
In the next docs, we are going to show a step-by-step guide on reconfiguring TLS configuration of a FerretDB using FerretDBOpsRequest CRD.






























