-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[bitnami/mongodb] Mongodb Replicaset existingSecrets doesn't work with cert-manager #16341
Comments
I actually did something similar to the Kafka chart, see here: #9422 |
Hi @rrileyca, Thank you for taking the time to report this issue. Would you like to contribute again by creating a PR to solve the issue? As you are familiar with the solution and the repo, you will be able to make the necessary changes to make this work. The Bitnami team will be happy to review it and provide feedback. As always, you can find here the contributing guidelines. Thanks |
Hi @jotamartos, I'm actually kind of confused as to how this chart would support any PKI certificates in ReplicaSet architecture. There are several problems:
A potential solution here might be to add the FQDN when What I have described above is a separate-but-related issue. If Bitnami can give me direction on the above comments, I will put in a separate issue and PR to fix that. |
Hi @rrileyca - It looks like we have been on a very similar journey. Your points about how the domains through the chart do not integrate well with a TLS certificate provided by the cert-manager has also been causing us trouble. I have described my approaches to some of these issues here: #16719 As you've said we have been adding an FQDN to the hosts file using the I still believe taking the same approach as the kafka chart would be super valuable. I am also working with a certificate which is missing the |
I have created a PR to match the kafka changes: #16731 I was wondering if we should also consider an option to use I have a few more experiments to run but will be running out of time this week, let me know if this provides any progress. |
Thank you for taking the time to create this PR. I just saw that the team already reviewed and merged it. I hope that solves the issues you found. |
I think it solves this problem, thanks. Special thanks to @dtrts. I wonder what solution you have for the FQDN problem. No public ACME will sign a certificate with For me, I manually edited the replica set config to make the hostnames the FQDN, and then I configured CoreDNS to rewrite the FQDN to the I may file a separate issue but wanted to check with you first @dtrts. |
@rrileyca All thanks to your Kafka fix! I'm not sure I follow your question completely, but here are the other fixes I ran: Configuration:
Pre setup.sh scriptBefore i let the setup script run I do a bunch of changes. Replace hostname in
|
@dtrts That's an interesting solution. I wouldn't say it's "proper" to add My solution was to edit the My solution was to create a CoreDNS rewrite rule, but this is platform-dependent as your Kubernetes cluster will require CoreDNS. My understanding is this is fairly common, but not standard. In any case, the rewrite rule allows you to intercept a DNS request and edit the name being looked up. The rules looks like this: apiVersion: v1
kind: ConfigMap
metadata:
name: coredns-custom
namespace: kube-system
data:
my.server: |
mongodb-0.mydomain.com:53 {
log
errors
rewrite stop {
name mongodb-0.mydomain.com. mongodb-0.mongodb-headless.mongodb.svc.cluster.local
}
forward . 127.0.0.1
}
mongodb-1.mydomain.com:53 {
log
errors
rewrite stop {
name mongodb-1.mydomain.com. mongodb-1.mongodb-headless.mongodb.svc.cluster.local
}
forward . 127.0.0.1
}
mongodb-2.mydomain.com:53 {
log
errors
rewrite stop {
name mongodb-2.mydomain.com. mongodb-2.mongodb-headless.mongodb.svc.cluster.local
}
forward . 127.0.0.1
} So as a request for |
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback. |
Bump |
Hi @rrileyca, I understand you want to keep this ticket open to continue discussing about the issue you are running into with @dtrts, correct? That's not a problem at all, just confirming. As you know, if your use case doesn't work as expected when using our solution, you can always contribute to improve it. Thanks |
Hello @jotamartos, @dtrts and I have proposed some workarounds, but the chart is still broken. If I don't bump the thread then the issue gets closed by your bot, and then the chart remains broken. I can appreciate why you'd close stale issues in scenarios where an issue is unclear or the reporter stops answering questions required to proceed, but that isn't the case here. The chart is still affected by this issue. I don't have time to contribute at the moment. How does Bitnami file bugs like this? I think it is worth fixing. I doubt we will be the last users to try to use |
Hi @rrileyca, Yes, we continue maintaining our solutions and updating them when an issue is reported. I'm going to create a task on our side to review the solution and the information you posted here, but please note that our bandwidth is limited and it can take some time for this to be fixed. That's why we always suggest contributing to improve the solution. This way, you will help the community and our team will review that you follow the best practices when applying the patch. If you do not have time to contribute, do not worry, as I mentioned above, I'll create a task to work on this in the future. Note: I'll add the on-hold label to prevent the ticket being closed by the bot Thanks |
Name and Version
bitnami/mongodb 13.9.4
What architecture are you using?
amd64
What steps will reproduce the bug?
When setting values.yaml with the following values:
Each secret must have a field
ca.crt
, as documented in thevalues.yaml
comment. However, the Jetstackcert-manager
(arguably a very common if not "standard" kubernetes application) does not produce such a field. Without the ability to inject the field manually in the helm chart, there is no integration capability out of the box.Are you using any custom parameters or values?
values:
What is the expected behavior?
Either the helm chart can deploy without a
ca.crt
, or it would provide a way to inject one.What do you see instead?
The Pods fail to
Init
.Running the command:
I see the output:
Additional information
No response
The text was updated successfully, but these errors were encountered: