Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Optionally configure the cluster to use X.509 certificate authentication (mTLS) #15

Open
dnault opened this issue Nov 30, 2023 · 0 comments
Labels
enhancement New feature or request

Comments

@dnault
Copy link
Contributor

dnault commented Nov 30, 2023

One neat feature of cbdyncluster was the ability to configure the cluster to use client certificates. Here's what that looks like:

CLUSTER_ID=`cbdyncluster allocate --num-nodes 1 --server-version 6.5.1`
cbdyncluster setup $CLUSTER_ID --bucket default --user alice:password --node kv
cbdyncluster setup-cert-auth $CLUSTER_ID --user alice

After configuring the cluster, cbdyncluster writes 3 files to the local working directory:

  • client.pem (client certificate)
  • client.key (client private key)
  • ca.pem (server Certificate Authority certificate)

As a convenience, it might be nice if cbdinocluster (optionally?) assembled client.pem and client.key into a pkcs12 bundle.

@dnault dnault added the enhancement New feature or request label Nov 30, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant