diff --git a/CHANGELOG.md b/CHANGELOG.md index 944b3ef2..6fe2df08 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,6 +1,9 @@ # SAS Viya Monitoring for Kubernetes ## Unreleased +* **Overall** + * [FIX] Modified renew-tls-certs.sh script to regenerate the root CA cert when renewing auto-generated certs + * **Metrics** * [CHANGE] Grafana dashboards for RabbitMQ upgraded to newer versions * [CHANGE] All Grafana dashboards (maintained as part of this project) migrated to Grafana 11 diff --git a/bin/renew-tls-certs.sh b/bin/renew-tls-certs.sh index 2af617fa..9714d82f 100755 --- a/bin/renew-tls-certs.sh +++ b/bin/renew-tls-certs.sh @@ -106,7 +106,7 @@ function renew-certs { log_info "Generating new certs for [Alertmanager, Prometheus, Grafana]" log_info "Deleting existing secrets for [Alertmanager, Prometheus, Grafana]" - for secretName in prometheus-tls-secret alertmanager-tls-secret grafana-tls-secret; do + for secretName in prometheus-tls-secret alertmanager-tls-secret grafana-tls-secret v4m-root-ca-tls-secret; do if [ -n "$(kubectl get secret -n $MON_NS $secretName -o name 2>/dev/null)" ]; then if (tls_cert_managed_by_v4m "$MON_NS" "$secretName") then kubectl delete secret -n "$MON_NS" $secretName @@ -126,7 +126,7 @@ function renew-certs { log_info "Generating new certs for [OpenSearch, OpenSearch Dashboards]" log_info "Deleting existing secrets for [OpenSearch, OpenSearch Dashboards]" - for secretName in kibana-tls-secret es-transport-tls-secret es-rest-tls-secret es-admin-tls-secret; do + for secretName in kibana-tls-secret es-transport-tls-secret es-rest-tls-secret es-admin-tls-secret v4m-root-ca-tls-secret; do if [ -n "$(kubectl get secret -n $LOG_NS $secretName -o name 2>/dev/null)" ]; then if (tls_cert_managed_by_v4m "$LOG_NS" "$secretName") then kubectl delete secret -n "$LOG_NS" $secretName