The scenario: I'm having Apache Pulsar v2.6.0 deployed in Rancher Kubernetes, together with jetstack/cert-manager:
helm install cert-manager jetstack/cert-manager --namespace cert-manager --set installCRDs=true
helm install --values ./values.yaml pulsar apache/pulsar
I also configured TLS for all Pulsar components as follows (values.yaml):
tls:
enabled: true
# common settings for generating certs
common:
keySize: 2048
# settings for generating certs for proxy
proxy:
enabled: true
# settings for generating certs for broker
broker:
enabled: true
# settings for generating certs for bookies
bookie:
enabled: true
# settings for generating certs for zookeeper
zookeeper:
enabled: true
However, cert-manager generates the secrets names with a hash suffix, so when creating e.g. a Zookeeper pod, Kubernetes complains that it cannot find the tls secret and fails with the event 'MountVolume.SetUp failed for volume "zookeeper-certs" : secret "pulsar-tls-zookeeper" not found'.
Any idea how to handle this scenario?