Description
Related problem
From the docs:
When the certificate or key in the
brokerCertChainAndKey
secret is updated, the operator will automatically detect it in the next reconciliation and trigger a rolling update of the Kafka brokers to reload the certificate.
In an environment where a Kafka broker restart is very undesirable, it becomes hard to keep external TLS certificates short-lived (e.g. 24 hours with a 3rd-party PKI) because each change of certificates will cause a Kafka restart and usually a downtime.
In general, it'd be great to have as few reasons for a broker restart as possible.
Suggested solution
Once a Kubernetes secret referenced in brokerCertChainAndKey
got changed, Strimzi Operator will dynamically replace old certificates with the new ones without restarting the brokers.
Alternatives
A proper HA configuration might reduce the effects of such restarts but it's not always possible.
Additional context
It seems like Kafka itself supports hot-swapping of certificates.