|
| 1 | +// Module included in the following assembly: |
| 2 | +// |
| 3 | +// * observability/monitoring/monitoring-stack-architecture.adoc |
| 4 | + |
| 5 | +:_mod-docs-content-type: CONCEPT |
| 6 | +[id="tls-security-and-rotation_{context}"] |
| 7 | += TLS security and rotation in the monitoring stack |
| 8 | + |
| 9 | +[role="_abstract"] |
| 10 | +Learn how TLS profiles and certificate rotation work in the {product-title} monitoring stack to keep communication secure. |
| 11 | + |
| 12 | +TLS security profiles for monitoring components:: |
| 13 | +All components of the monitoring stack use the TLS security profile settings that are centrally configured by a cluster administrator. |
| 14 | +The monitoring stack component uses the TLS security profile settings that already exist in the `tlsSecurityProfile` field in the global {product-title} `apiservers.config.openshift.io/cluster` resource. |
| 15 | + |
| 16 | +TLS certificate rotation and automatic restarts:: |
| 17 | +The {cmo-full} manages the internal TLS certificate lifecycle for the monitoring components. These certificates secure the internal communication between the monitoring components. |
| 18 | ++ |
| 19 | +During certificate rotation, the {cmo-short} updates secrets and config maps, which triggers automatic restarts of affected pods. This is an expected behavior, and the pods recover automatically. |
| 20 | ++ |
| 21 | +The following example shows events that occur during certificate rotation: |
| 22 | ++ |
| 23 | +[source,terminal] |
| 24 | +---- |
| 25 | +$ oc get events -n openshift-monitoring |
| 26 | + |
| 27 | +LAST SEEN TYPE REASON OBJECT MESSAGE |
| 28 | +2h39m Normal SecretUpdated deployment/cluster-monitoring-operator Updated Secret/grpc-tls -n openshift-monitoring because it changed |
| 29 | +2h39m Normal SecretCreated deployment/cluster-monitoring-operator Created Secret/prometheus-user-workload-grpc-tls -n openshift-user-workload-monitoring because it was missing |
| 30 | +2h39m Normal SecretCreated deployment/cluster-monitoring-operator Created Secret/thanos-querier-grpc-tls -n openshift-monitoring because it was missing |
| 31 | +2h39m Normal SecretCreated deployment/cluster-monitoring-operator Created Secret/thanos-ruler-grpc-tls -n openshift-user-workload-monitoring because it was missing |
| 32 | +2h39m Normal SecretCreated deployment/cluster-monitoring-operator Created Secret/prometheus-k8s-grpc-tls -n openshift-monitoring because it was missing |
| 33 | +2h38m Warning FailedMount pod/prometheus-k8s-0 MountVolume.SetUp failed for volume "secret-grpc-tls" : secret "prometheus-k8s-grpc-tls" not found |
| 34 | +2h39m Normal Created pod/prometheus-k8s-0 Created container kube-rbac-proxy-thanos |
| 35 | +2h39m Normal Started pod/prometheus-k8s-0 Started container kube-rbac-proxy-thanos |
| 36 | +2h39m Normal SuccessfulDelete statefulset/prometheus-k8s delete Pod prometheus-k8s-0 in StatefulSet prometheus-k8s successful |
| 37 | +2h39m Normal SuccessfulCreate statefulset/prometheus-k8s create Pod prometheus-k8s-0 in StatefulSet prometheus-k8s successful |
| 38 | +---- |
0 commit comments