You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
I am attempting to use the Log Ingest endpoint from the in-cluster activegate created by the operator.
When setting up the certificate, ran into issues with using a tls secret and had to manually create a secret for dynatrace operator to use.
Also, the oneagent pods required an undocumented configuration in the secret requiring a server.crt key to intialize
server.crt in the dynatrace-formatted-secret = ca.crt on the activegate-certificate-tls
server.p12 in the dynatrace-formatted-secret = keystore.p12 on the activegate-certificate-tls
Describe alternatives you've considered
I've considered alternative methods of generating this secret by combining data from various in-cluster objects
The text was updated successfully, but these errors were encountered:
Thank you for opening a Dynatrace Operator Issue. We've identified and tagged the issue as a "Feature request".
Dynatrace reviews feature requests in the Dynatrace community rather than Github. This helps our team consolidate, rank, and prioritize important input like yours.
Please search for similar requests, collaborate, and ask questions using the link above. Remember to add the labels "kubernetes" and "dynatrace-operator" to help get the attention you deserve.
Is your feature request related to a problem? Please describe.
I am attempting to use the Log Ingest endpoint from the in-cluster activegate created by the operator.
When setting up the certificate, ran into issues with using a tls secret and had to manually create a secret for dynatrace operator to use.
Also, the oneagent pods required an undocumented configuration in the secret requiring a
server.crt
key to intializeDescribe the solution you'd like
This would be much simpler to configure if the secret reference in DynaKube followed the tls secret format
kubernetes.io/tls
along with removing the password requirementhttps://cert-manager.io/docs/faq/#why-are-passwords-on-jks-or-pkcs12-files-not-helpful
server.crt in the
dynatrace-formatted-secret
= ca.crt on theactivegate-certificate-tls
server.p12 in the
dynatrace-formatted-secret
= keystore.p12 on theactivegate-certificate-tls
Describe alternatives you've considered
I've considered alternative methods of generating this secret by combining data from various in-cluster objects
The text was updated successfully, but these errors were encountered: