Skip to content

App Framework: Allow alternative CA authorities for S3 buckets #1103

Open
@gjanders

Description

@gjanders

Please select the type of request

Bug

Tell us more

Describe the request

2023-03-06T09:46:18.392485856Z  ERROR   GetAppListFromRemoteBucket      Unable to get apps list {"controller": "clustermanager", "controllerGroup": "enterprise.splunk.com", "controllerKind": "ClusterManager", "C
lusterManager": {"name":"mobiles-cm","namespace":"mobiles"}, "namespace": "mobiles", "name": "mobiles-cm", "reconcileID": "517c5a41-f927-4e6c-9d11-4bd9a72a9753", "name": "mobiles-cm", "namespace": "mobiles", "ap
pSource": "clusterApps", "error": "got an object error: Get \"https://10.x.x.x/k8s_mobile-idx-config/?location=\": x509: certificate signed by unknown authority for bucket: k8s_mobile-iot-idx-config"}

Expected behavior
The S3 bucket should be allowed even if a company CA certificate i used on-prem to sign the server (which is common for on-prem object storage).

Splunk setup on K8S
Splunk operator 2.2.0

Reproduction/Testing steps

spec:
  appRepo:
    appInstallPeriodSeconds: 90
    appSources:
    - location: clusterApps/
      name: clusterApps
    appsRepoPollIntervalSeconds: 900
    defaults:
      scope: cluster
      volumeName: volume_app_repo_us
    installMaxRetries: 2
    volumes:
    - endpoint: https://10.x.x.x
      name: volume_app_repo_us
      path: k8s_mobile-iot-idx-config/
      provider: minio
      region: us-west-2
      secretRef: mobile-iot-s3-secret
      storageType: s3

K8s environment

k8s cluster

Proposed changes(optional)

Allow self-signed/CA signed certificates from s3 storage provider

K8s collector data(optional)
Let me know if you need this

Additional context(optional)
If there is a flag or switch I can use to disable the validation please let me know

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions