Open vinnytwice opened 1 year ago
@vinnytwice the reason for this is the use of subPath in the secrets volumeMount.
As per the kubernetes documentation secrets mounted via subPath do not receive updates
https://kubernetes.io/docs/concepts/configuration/secret/
Note: A container using a Secret as a subPath volume mount does not receive automated Secret updates.
@harshitsinghvi22 Hi and thanks for answering this quick.
As per the kubernetes documentation secrets mounted via subPath do not receive updates
should I use the trusted Certs array instead? something like:
ssl:
# setting per "connector" matching neo4j config
bolt:
#privateKey:
#secretName: tls-secret
#subPath: tls.key
#publicCertificate:
#secretName: tls-secret
#subPath: tls.crt
trustedCerts:
sources:
- secret:
name: tls-secret
items:
- key: tls.crt
path: tls.crt
- key: tls.key
path: tls.key
revokedCerts:
sources: []
Would I use it as the example above or in addiction to privateKey
and publicCertificate
but omitting both the subpath
parameters?
Thank you very much again.
@vinnytwice i am looking into this however my previous observation seems to be a bit incomplete. It seems even though the subPath was not in place and k8s would update the certificates, Neo4j as a product would still need a restart. Neo4j as of now needs a restart to reflect the new certificates. I am checking more on this with our internal teams and will get back to you once I have some update on this.
To be honest , this might require some engineering effort from our internal product team as this is requested from other customers as well and helm charts will be able to support it only when its supported by product itself.
@harshitsinghvi22 Hi, I see. So it won't pick the renewed cert even if its referenced in the trustedCerts
array, correct?
To be honest , this might require some engineering effort from our internal product team as this is requested from other customers as well and helm charts will be able to support it only when its supported by product itself.
Yes, I was expecting as well as other customers, that Neo4j would pick renewed certificates automatically as having to restart it manually is a bit of a tedious job. It's a much needed feature, so I guess it will get fixed soon, you guys are very responsive and I'm glad for that.
I am checking more on this with our internal teams and will get back to you once I have some update on this.
Yes please, keep in the loop on this.
Thank you very much again. Cheers
@harshitsinghvi22 Hi, I see. So it won't pick the renewed cert even if its referenced in the
trustedCerts
array, correct?
Trustedcerts wont help here...thats a separate attribute , privateKey and publicCertificate are must and those locations need to be update with the renewed certificate and than a Neo4j restart is required at the moment so that the new certs should get picked
@harshitsinghvi22 Oh I see. So I'll just keep deploying the chart as currently setup and restart the pods until this automatic renewed cert pickup gets sorted. Thank you very much again. Cheers
@harshitsinghvi22 hi, amd happy new year!! do you have any news about the automatic renewed certificates pick-up?
@vinnytwice happy new year to you too !! Checked with the respective team and unfortunately the feature is not yet scheduled. I will keep this thread updated with the latest info.
hey! any news on this issue?
We'd be interested in this feature as well!
Contact Details
No response
What happened?
I have a Node.js server which uses MongoDb and Neo4j in a AKS Cluster all deployed via Helm Charts ( standalone for Neo4j, but I'm switch to neo4j-reverse-proxychart) . I have A Certificate issued by Let's Encrypt which is used both for the server and for Neo4j bolt connection. I deployed the cluster in February and it all worked fine, but now when writing to Neo4j it throws the
Failed to connect to server
error with theSocket responded with: CERT_HAS_EXPIRED
reason andBrowser
does not connect to the db.The certificate has been renewed automatically in April and my guess is that Neo4j just stuck with the first certificate, is it possible?
this is the Certificate
Neo4 ssl settings in the Neo4j Chart's Values :
After scaling down Neo4j cluster to 0 replicas and up to 1 replicas it all start working again as expected as Neo4j starts with the renewed certificate, but it's there a way to set it up to make this automatic?
Many thanks.
Chart Name
Standalone
Chart Version
4.4.2
Environment
Microsoft Azure
Relevant log output
No response
Code of Conduct