Skip to content

CA certificate is too short using Vault to manage SSL certs #1138

@mhonorio

Description

@mhonorio

Is your feature request related to a problem? Please describe.
No.

Describe the solution you'd like
When using Vault to manage TLS certificate, after one month vault-agent starts to fail with vault cannot satisfy request, as TTL would result in notAfter because by default max-ttl is only one month, no matter if we put 8760h here: https://github.com/rabbitmq/cluster-operator/blob/main/docs/examples/vault-tls/setup.sh#L12

My suggestion is to include the following line after enabling pki secrets:

vault_exec "vault secrets tune -default-lease-ttl=8760h -max-lease-ttl=8760h pki/"

Describe alternatives you've considered
Even one year is short for me for CA certificates. In my production RabbitMQ clusters I've set 87600h which is 10 years.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions