-
Hi, In order to avoid as much downtime as possible, I'm adding a custom certificate for NiFi, to be used instead of the auto-generated one, with a higher expiration time. I managed to add it to the keystore/truststore (expanding on #29) and configure NiFi to use it. So far, so good. The problem now is the Thanks. Best regards. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
Hi. The intended way to use a custom certificate is to create a custom Nifi-Operator specifically doesn't currently support setting the secretclass (stackabletech/nifi-operator#499), but in the meantime it can be done using pod overrides: apiVersion: nifi.stackable.tech/v1alpha1
kind: NifiCluster
metadata: ...
spec:
...
nodes:
...
podOverrides:
spec:
volumes:
- name: keystore
ephemeral:
volumeClaimTemplate:
metadata:
annotations:
secrets.stackable.tech/class: foo This should prevent the restart annotation from being created, and should not require any custom init containers or such hacks. In fact, writing into the secret volume by hand is unsupported, and may break in the future. That said, I would strongly suggest that the correct way to avoid downtime is to add redundant replicas, rather than to compromise the system to try to avoid the single-point-of-failure going down. |
Beta Was this translation helpful? Give feedback.
Hi.
The intended way to use a custom certificate is to create a custom
SecretClass
that uses thek8sSearch
backend.Nifi-Operator specifically doesn't currently support setting the secretclass (stackabletech/nifi-operator#499), but in the meantime it can be done using pod overrides:
This should prevent the restart annotation from being created, and s…