TLS certificate management
Table of Contents
HTTPS deployment implies (and requires) that each AIS node has a valid TLS (a.k.a. X.509) certificate.
The latter has a number of interesting properties ultimately intended to authenticate clients (users) to servers (AIS nodes). And vice versa.
In addition, TLS certificates tend to expire from time to time. In fact, each TLS certificate has expiration date with the standard-defined maximum being 13 months (397 days).
Some sources claim 398 days but the (much) larger point remains: TLS certificates do expire. Which means, they must be periodically updated and timely reloaded.
Starting v3.24, AIStore:
- tracks certificate expiration times;
- automatically - upon update - reloads updated certificates;
- raises associated alerts.
ais tls command
Cert alerts
Associated alerts are listed below but first - an example:
Overall, there are currently 3 (three) related alerts:
Show TLS certificate
The command has an optional NODE argument - press <TAB-TAB> to select.
Otherwise, simply run:
Load TLS certificate
By default, all nodes in the cluster with (unconditionlly) reload X.509 certificates from the respective configured locations:
But you can also choose any specific node, and ask it to reload. See ais tls load-certificate --help for details.
If aistore is deployed with aithentication (enabled), reloading certificates will require administrative permissions.
See
ais config clustercommand and relatedauth.enabledknob.