Configure TLS in Aonnis Valkey Cluster
TLS configuration is suported with cert-manager
Refer to the cert-manager documentation for detailed guidance on configuring certificates. The Getting started Helm charts currently use self-signed certificates. However, for production environments, it is recommended to use a trusted Certificate Authority (CA) instead of self-signed certificates.
The following TLS configuration should be used to secure your cluster's TLS traffic:
tlsConfig
- Type: Dictionary or Map
- Description: TLS config for valkey cluster. TLS secret must to be prepopulated before creatinng a valkey clsuter.
- Fields:
enabled:- Type:
bool - Description: Is TLS enabled on valkey cluster or not.
- Required:
false - Default:
false
- Type:
insecure:- Type:
bool - Description: Are TLS certificates signed by trusted CA or not
- Required:
false - Default:
false
- Type:
tlsCertSecretRef:- Type:
CertSecretRef - Description: Reference of secret where tls cert is stored
- Required:
true
- Type:
tlsKeySecretRef:- Type:
CertSecretRef - Description: Reference of secret where tls key is stored
- Required:
true
- Type:
tlsCaSecretRef:- Type:
CertSecretRef - Description: Reference of secret where tls ca cert is stored
- Required:
true
- Type:
- Example:
tlsConfig:
enabled: true
insecure: true
tlsCertSecretRef:
name: valkey-tls-secret
key: tls.crt
tlsKeySecretRef:
name: valkey-tls-secret
key: tls.key
tlsCaSecretRef:
name: valkey-tls-secret
key: ca.crt
What is insecure in tlsConfig
The insecure flag in tlsConfig determines how Aonnis Valkey Panther handles TLS certificate validation. Since Aonnis Valkey Panther must distinguish between self-signed and CA-issued certificates to manage them effectively, this flag provides a mechanism to indicate whether self-signed certificates are being used.
By default, Aonnis Valkey Panther assumes that TLS certificates are issued by a trusted Certificate Authority (CA). If self-signed certificates are in use, setting insecure: true explicitly informs the system to bypass strict certificate validation, ensuring proper handling of TLS connections. However, for production environments, it is strongly recommended to use CA-signed certificates and keep insecure set to false to maintain security and compliance best practices.
Once a cluster is created with the insecure flag enabled or dissabled, changing this flag at a later stage is strongly discouraged. Modifying this setting after deployment may causeAonnis Valkey Pantherto lose its ability to manage the cluster effectively. As a result, the Valkey cluster could become unmanaged, leading to potential security and operational risks.
To ensure stability and maintain proper cluster management, it is recommended to carefully determine the insecure flag value during the initial setup and avoid altering it post-deployment.
We are actively working on enhancing this functionality to allow seamless updates to the insecure flag in the future without impacting cluster management.