Replies: 1 comment
-
Maybe you can consider using something like Let's Encrypt that can give you the certificate as a file that can be mounted directly into the broker? If you would want to use the AWS certificates, you might need to figure it out from scratch. But keep in mind:
So I think if you want to use the AWS certificates, you would need to kick the Nginx Ingress aside and use the load balancers directly - either classic or NLB and do either TLS termination in the load balancer or TLS re-encryption from the AWS certs to the Strimzi certs in the load balancer. That might work, but I have never done this myself. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I have a working setup currently, but the problem is that I have clients which need the Strimzi cluster ca cert if they have to connect. I want to solve this by using an AWS certificate, which already exists for our domain. I read in many discussions here that the brokerCertchainAndKey property can be used to set a custom certificate, but AWS ACM does not allow to download cert. We can only use them on AWS resources like NLB/ALB.
My setup is as follows:
[Kafka brokers (Strimzi CA)(TLS Termination)] <--- [NGINX service with NLB Loadbalancer IP and TLS Passthrough] <--- [Ingresses with NLB IP] <--- [Golang code running in a remote cluster with Kafka client (has strimzi ca cert in local trust store)]
Looking for any suggestions that will help avoid the need for client to have the strimiz ca certificate to do TLS verification of the broker.
here's my Kafka setup:
Beta Was this translation helpful? Give feedback.
All reactions