You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/guides/mongodb/recommendation/rotate-auth-recommendation.md
+2-76Lines changed: 2 additions & 76 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ section_menu_id: guides
16
16
17
17
Rotating authentication secrets in database management is vital to mitigate security risks, such as credential leakage or unauthorized access, and to comply with regulatory requirements. Regular rotation limits the exposure of compromised credentials, reduces the risk of insider threats, and enforces updated security policies like stronger passwords or algorithms. It also ensures operational resilience by testing the rotation process and revoking stale or unused credentials. KubeDB provides `RotateAuth` which reduces manual errors, and strengthens database security with minimal effort. KubeDB Ops-manager generates Recommendation for rotating authentication secrets via this OpsRequest.
18
18
19
-
`Recommendation` is a Kubernetes `Custom Resource Definitions` (CRD). It provides a declarative recommendation for KubeDB managed databases like [MongoDB](https://www.elastic.co/products/mongodb) in a Kubernetes native way. The recommendation will only be created if `.spec.authSecret.rotateAfter` is set. KubeDB generates MongoDB Rotate Auth recommendation regarding two particular cases.
19
+
`Recommendation` is a Kubernetes `Custom Resource Definitions` (CRD). It provides a declarative recommendation for KubeDB managed databases like [MongoDB](https://www.mongodb.com/) in a Kubernetes native way. The recommendation will only be created if `.spec.authSecret.rotateAfter` is set. KubeDB generates MongoDB Rotate Auth recommendation regarding two particular cases.
20
20
21
21
1. AuthSecret lifespan is more than one month and, less than one month remaining till expiry
22
22
2. AuthSecret lifespan is less than one month and, less than one third of lifespan remaining till expiry
- Learn how to configure [MongoDB Cluster](/docs/guides/mongodb/clustering/replicaset.md).
325
325
- Monitor your MongoDB database with KubeDB using [`out-of-the-box` Prometheus operator](/docs/guides/mongodb/monitoring/using-prometheus-operator.md).
326
326
- Use [private Docker registry](/docs/guides/mongodb/private-registry/using-private-registry.md) to deploy MongoDB with KubeDB.
327
-
- Want to hack on KubeDB? Check our [contribution guidelines](/docs/CONTRIBUTING.md).
328
-
329
-
330
-
apiVersion: kubedb.com/v1
331
-
kind: Postgres
332
-
metadata:
333
-
labels:
334
-
app.kubernetes.io/instance: postgres
335
-
app.kubernetes.io/managed-by: Helm
336
-
app.kubernetes.io/name: postgreses.kubedb.com
337
-
name: postgres
338
-
namespace: pg
339
-
spec:
340
-
deletionPolicy: WipeOut
341
-
authSecret:
342
-
rotateAfter: 1h
343
-
podTemplate:
344
-
spec:
345
-
containers:
346
-
- name: postgres
347
-
resources:
348
-
limits:
349
-
cpu: 500m
350
-
memory: 1Gi
351
-
requests:
352
-
cpu: 500m
353
-
memory: 1Gi
354
-
securityContext:
355
-
allowPrivilegeEscalation: false
356
-
capabilities:
357
-
drop:
358
-
- ALL
359
-
runAsGroup: 70
360
-
runAsNonRoot: true
361
-
runAsUser: 70
362
-
seccompProfile:
363
-
type: RuntimeDefault
364
-
- name: pg-coordinator
365
-
securityContext:
366
-
allowPrivilegeEscalation: false
367
-
capabilities:
368
-
drop:
369
-
- ALL
370
-
runAsGroup: 70
371
-
runAsNonRoot: true
372
-
runAsUser: 70
373
-
seccompProfile:
374
-
type: RuntimeDefault
375
-
initContainers:
376
-
- name: postgres-init-container
377
-
securityContext:
378
-
allowPrivilegeEscalation: false
379
-
capabilities:
380
-
drop:
381
-
- ALL
382
-
runAsGroup: 70
383
-
runAsNonRoot: true
384
-
runAsUser: 70
385
-
seccompProfile:
386
-
type: RuntimeDefault
387
-
nodeSelector:
388
-
kubernetes.io/os: linux
389
-
securityContext:
390
-
fsGroup: 999
391
-
replicas: 3
392
-
storage:
393
-
accessModes:
394
-
- ReadWriteOnce
395
-
resources:
396
-
requests:
397
-
storage: 4Gi
398
-
storageClassName: local-path
399
-
storageType: Durable
400
-
version: "16.4"
401
-
327
+
- Want to hack on KubeDB? Check our [contribution guidelines](/docs/CONTRIBUTING.md).
Copy file name to clipboardExpand all lines: docs/guides/mongodb/recommendation/rotate-tls-recommendation.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ section_menu_id: guides
16
16
17
17
TLS certificate rotation in databases is essential for maintaining security, ensuring compliance, and preventing service disruptions. Regular rotation mitigates risks like certificate expiry and key compromise, adapts to evolving cryptographic standards, and maintains trust relationships with Certificate Authorities. It also enhances operational resilience by testing renewal processes and ensures smooth auditing and monitoring. To minimize risks and streamline the process, KubeDB provides ReconfigureTLS OpsRequest support. KubeDB Ops-manager generates Recommendation to rotate TLS certificates via this OpsRequest when their expiry is near.
18
18
19
-
`Recommendation` is a Kubernetes `Custom Resource Definitions` (CRD). It provides a declarative recommendation for KubeDB managed databases like [MongoDB](https://www.mongo.co/products/mongodb) in a Kubernetes native way. KubeDB generates MongoDB/Opensearch Rotate TLS recommendation regarding if:
19
+
`Recommendation` is a Kubernetes `Custom Resource Definitions` (CRD). It provides a declarative recommendation for KubeDB managed databases like [MongoDB](https://www.mongodb.com/) in a Kubernetes native way. KubeDB generates MongoDB/Opensearch Rotate TLS recommendation regarding if:
20
20
21
21
- At least one of its certificate’s lifespan is more than one month and less than one month remaining till expiry
- Learn about [backup & restore](/docs/guides/mongodb/backup/stash/overview/index.md) MongoDB database using Stash.
340
-
- Learn how to configure [MongoDB Topology Cluster](/docs/guides/mongodb/clustering/topology-cluster/simple-dedicated-cluster/index.md).
340
+
- Learn how to configure [MongoDB Cluster](/docs/guides/mongodb/clustering/replicaset.md).
341
341
- Monitor your MongoDB database with KubeDB using [`out-of-the-box` Prometheus operator](/docs/guides/mongodb/monitoring/using-prometheus-operator.md).
342
342
- Use [private Docker registry](/docs/guides/mongodb/private-registry/using-private-registry.md) to deploy MongoDB with KubeDB.
343
343
- Want to hack on KubeDB? Check our [contribution guidelines](/docs/CONTRIBUTING.md).
0 commit comments