New to KubeDB? Please start here.
Rotate Authentication of Druid
This guide will give an overview on how KubeDB Ops-manager operator Rotate Authentication configuration.
Before You Begin
- You should be familiar with the following
KubeDB
concepts:
How Rotate Druid Authentication Configuration Process Works
The authentication rotation process for Druid using KubeDB involves the following steps:
A user first creates a
Druid
Custom Resource Object (CRO).The
KubeDB Provisioner operator
continuously watches forDruid
CROs.When the operator detects a
Druid
CR, it provisions the requiredPetSets
, along with related resources such as secrets, services, and other dependencies.To initiate authentication rotation, the user creates a
DruidOpsRequest
CR with the desired configuration.The
KubeDB Ops-manager
operator watches forDruidOpsRequest
CRs.Upon detecting a
DruidOpsRequest
, the operator pauses the referencedDruid
object, ensuring that the Provisioner operator does not perform any operations during the authentication rotation process.The
Ops-manager
operator then updates the necessary configuration (such as credentials) based on the providedDruidOpsRequest
specification.After applying the updated configuration, the operator restarts all
Druid
Pods so they come up with the new authentication environment variables and settings.Once the authentication rotation is completed successfully, the operator resumes the
Druid
object, allowing the Provisioner operator to continue its usual operations.
In the next section, we will walk you through a step-by-step guide to rotating Druid authentication using the DruidOpsRequest
CRD.