New to KubeDB? Please start here.
Rotate Authentication of Hazelcast
This guide will give an overview on how KubeDB Ops-manager operator Rotate Authentication configuration.
Before You Begin
- You should be familiar with the following
KubeDB
concepts:
How Rotate Hazelcast Authentication Configuration Process Works
The following diagram shows how KubeDB Ops-manager operator Rotate Authentication of a Hazelcast
. Open the image in a new tab to see the enlarged version.
The Rotate Hazelcast Authentication process consists of the following steps:
At first, a user creates a
Hazelcast
Custom Resource Object (CRO).KubeDB
Provisioner operator watches theHazelcast
CRO.When the operator finds a
Hazelcast
CR, it creates required number ofPetSets
and related necessary stuff like secrets, services, etc.Then, in order to rotate the authentication configuration of the
Hazelcast
, the user creates aHazelcastOpsRequest
CR with desired information.KubeDB
Ops-manager operator watches theHazelcastOpsRequest
CR.When it finds a
HazelcastOpsRequest
CR, it pauses theHazelcast
object which is referred from theHazelcastOpsRequest
. So, theKubeDB
Provisioner operator doesn’t perform any operations on theHazelcast
object during the rotating Authentication process.Then the
KubeDB
Ops-manager operator will update necessary configuration based on the Ops Request yaml to update credentials.Then the
KubeDB
Ops-manager operator will restart all the Pods of the database so that they restart with the new authenticationENVs
or other configuration defined in theHazelcastOpsRequest
CR.After the successful rotating of the
Hazelcast
Authentication, theKubeDB
Ops-manager operator resumes theHazelcast
object so that theKubeDB
Provisioner operator resumes its usual operations.
In the next docs, we are going to show a step by step guide on rotating Authentication configuration of a Hazelcast using HazelcastOpsRequest
CRD.