New to KubeDB? Please start here.

Rotate Authentication of PerconaXtraDB

This guide will give an overview on how KubeDB Ops-manager operator Rotate Authentication configuration.

Before You Begin

How Rotate PerconaXtraDB Authentication Configuration Process Works

The authentication rotation process for PerconaXtraDB using KubeDB involves the following steps:

  1. A user first creates a PerconaXtraDB Custom Resource Object (CRO).

  2. The KubeDB Provisioner operator continuously watches for PerconaXtraDB CROs.

  3. When the operator detects a PerconaXtraDB CR, it provisions the required PetSets, along with related resources such as secrets, services, and other dependencies.

  4. To initiate authentication rotation, the user creates a PerconaXtraDBOpsRequest CR with the desired configuration.

  5. The KubeDB Ops-manager operator watches for PerconaXtraDBOpsRequest CRs.

  6. Upon detecting a PerconaXtraDBOpsRequest, the operator pauses the referenced PerconaXtraDB object, ensuring that the Provisioner operator does not perform any operations during the authentication rotation process.

  7. The Ops-manager operator then updates the necessary configuration (such as credentials) based on the provided PerconaXtraDBOpsRequest specification.

  8. After applying the updated configuration, the operator restarts all PerconaXtraDB Pods so they come up with the new authentication environment variables and settings.

  9. Once the authentication rotation is completed successfully, the operator resumes the PerconaXtraDB object, allowing the Provisioner operator to continue its usual operations.

In the next section, we will walk you through a step-by-step guide to rotating PerconaXtraDB authentication using the PerconaXtraDBOpsRequest CRD.