You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeDB? Please start here.
Rotate Authentication of Hazelcast
This guide will give an overview on how KubeDB Ops-manager operator Rotate Authentication configuration.
Before You Begin
- You should be familiar with the following
KubeDBconcepts:
How Rotate Hazelcast Authentication Configuration Process Works
The following diagram shows how KubeDB Ops-manager operator Rotate Authentication of a Hazelcast. Open the image in a new tab to see the enlarged version.
The Rotate Hazelcast Authentication process consists of the following steps:
At first, a user creates a
HazelcastCustom Resource Object (CRO).KubeDBProvisioner operator watches theHazelcastCRO.When the operator finds a
HazelcastCR, it creates required number ofPetSetsand related necessary stuff like secrets, services, etc.Then, in order to rotate the authentication configuration of the
Hazelcast, the user creates aHazelcastOpsRequestCR with desired information.KubeDBOps-manager operator watches theHazelcastOpsRequestCR.When it finds a
HazelcastOpsRequestCR, it pauses theHazelcastobject which is referred from theHazelcastOpsRequest. So, theKubeDBProvisioner operator doesn’t perform any operations on theHazelcastobject during the rotating Authentication process.Then the
KubeDBOps-manager operator will update necessary configuration based on the Ops Request yaml to update credentials.Then the
KubeDBOps-manager operator will restart all the Pods of the database so that they restart with the new authenticationENVsor other configuration defined in theHazelcastOpsRequestCR.After the successful rotating of the
HazelcastAuthentication, theKubeDBOps-manager operator resumes theHazelcastobject so that theKubeDBProvisioner operator resumes its usual operations.
In the next docs, we are going to show a step by step guide on rotating Authentication configuration of a Hazelcast using HazelcastOpsRequest CRD.






























