New to KubeVault? Please start here.
Reconfiguring TLS of VaultServer
This guide will give an overview on how KubeVault Enterprise operator reconfigures TLS configuration i.e. add TLS, remove TLS, update issuer/cluster issuer or Certificates and rotate the certificates of a VaultServer.
Before You Begin
- You should be familiar with the following
KubeVaultconcepts:
How Reconfiguring VaultServer TLS Configuration Process Works
The Reconfiguring VaultServer TLS process consists of the following steps:
At first, a user creates a
VaultServerCustom Resource Object (CRO).KubeVaultoperator watches theVaultServerCRO.When the operator finds a
VaultServerCR, it creates required number ofStatefulSetsand related necessary stuff like secrets, services, etc.Then, in order to reconfigure the TLS configuration of the
VaultServerthe user creates aVaultOpsRequestCR with desired information.KubeVaultoperator watches theVaultOpsRequestCR.When it finds a
VaultOpsRequestCR, it pauses theVaultServerobject which is referred from theVaultOpsRequest. So, theKubeVaultoperator doesn’t perform any operations on theVaultServerobject during the reconfiguring TLS process.Then the
KubeVaultoperator will add, remove, update or rotate TLS configuration based on the Ops Request yaml.Then the
KubeVaultoperator will restart all the Pods of the database so that they restart with the new TLS configuration defined in theVaultOpsRequestCR.After the successful reconfiguring of the
VaultServerTLS, theKubeVaultoperator resumes theVaultServerobject so that theKubeVaultCommunity operator resumes its usual operations.
In the next docs, we are going to show a step by step guide on reconfiguring TLS configuration of a VaultServer using VaultOpsRequest CRD.










