-
Hi ! I struggle to find information about the best/easiest way to manage certificate rotation for amqps connection, in case of rabbit deployed on k8s being exposed on Internet with a LB. We need to expose rabbitmq publicly and would like client to connect through a tls connection, ideally with a valid server certificate. While http workload (incl. rabbit admin) is easily handled with cert-manager and ingress, when it comes to amqps behind a LB, is there a better way but update the secret manually every year with a new cert? Also considering this valid certificate would not be that valid for internal connections (inside the cluster where rabbit runs), since it uses ClusterIP endpoint (rabbit.namespace.svc.cluster.local). Internal connections could still use amqp though. How would you manage your tls certs for this use case? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
Hi @mscbpi, thanks for using the cluster operator. Cluster operator works with cert manager managed certificates and you can specify different names in your provided certs as well. Certificates and caCert can be provided in the CRD manifest through We have several example deployments with tls too. I recommend to check them out here: If none of the example helps your use case, please provide more details on your rmq deployment architecture and your tls requirements. |
Beta Was this translation helpful? Give feedback.
Hi @mscbpi, thanks for using the cluster operator.
Cluster operator works with cert manager managed certificates and you can specify different names in your provided certs as well. Certificates and caCert can be provided in the CRD manifest through
spec.tls
(related doc).We have several example deployments with tls too. I recommend to check them out here:
If none of the example helps your use case, please provide more details on your rmq deployment architecture and your tls requirements.