Replies: 1 comment 2 replies
-
We are running into this same issue. There is an option to add your own CA files to the operator's trust store, however it doesn't seem to work for us. We're adding it with kustomize:
According to the source here, it's supposed to log the new certificates that it's adding but I don't see that in any of the logs. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'm currently working on Keda implementation in our org.
We do use Istio with mTLS enforced as security requirement, so it's not an option to disable Istio sidecar injection.
I've managed to apply a workaround with Keda-only ports exclusion:
That allow Keda to communicate internally with it's own mTLS which is fine for the security perspective (connection remain encrypted) at the same time Keda components can properly communicate with other mesh services (like Prometheus).
Another thing that is remaining is communication with Kube API. As I understand, Keda Metrics Adapter is registred as APIService
, so Kube API is trying to communicate with it using it's own TLS certificate which is not recognised by Keda (by default). As a result I see these errors in Metrics Adapter logs:
Also the APIService is getting 401 as Keda rejecting the request.
After spending some time I've applied a workaround to inject K8s CA to kedaorg-certs, that helped:
Later on, I've made practically the same through initContainer.
NOTE: We use cert-manager in our cluster, so I ditched the one in Keda helm-chart.
That's kind of OK, but I'm wondering is there any other way to deal with CA certificate injection? Can I just provide a directory containing all the CA files?
Beta Was this translation helpful? Give feedback.
All reactions