Kubernetes Secret TLS 证书 P12 和 Spring Boot 部署不起作用

Phi*_*rov 7 spring-boot kubernetes google-kubernetes-engine kubernetes-deployment kubernetes-secrets

我目前陷入困境,不知道如何继续。

这是我的 Spring Boot application.properties

...
spring.datasource.driverClassName=org.postgresql.Driver
spring.datasource.url=jdbc:postgresql://${POSTGRES_HOST}:5432/postgres
spring.datasource.username=${POSTGRES_USER}
spring.datasource.password=${POSTGRES_PASSWORD}
spring.datasource.testWhileIdle=true
spring.datasource.validationQuery=SELECT 1
spring.jpa.show-sql=true
spring.jpa.hibernate.ddl-auto=update
spring.jpa.hibernate.naming-strategy=org.hibernate.cfg.ImprovedNamingStrategy
spring.jpa.properties.hibernate.dialect=org.hibernate.dialect.PostgreSQLDialect

#Setup SSL
server.port: 8443
server.ssl.key-store: ${TLS_CERTIFICATE}
server.ssl.key-store-password: ${TLS_PASSWORD}
server.ssl.keyStoreType: PKCS12
server.ssl.keyAlias fundtr
...
Run Code Online (Sandbox Code Playgroud)

我的 Spring Boot 应用程序部署 yaml:

apiVersion: extensions/v1beta1
kind: Deployment
metadata:
  name: f-app
  namespace: default
spec:
  replicas: 1
  template:
    metadata:
      name: f-app
      labels:
        app: f-app
    spec:
      containers:
      - name: f-app
        image: eu.gcr.io/..../...
        env:
          - name: POSTGRES_USER
            valueFrom:
              configMapKeyRef:
                name: postgres-config
                key: postgres_user
          - name: POSTGRES_PASSWORD
            valueFrom:
              configMapKeyRef:
                name: postgres-config
                key: postgres_password
          - name: POSTGRES_HOST
            valueFrom:
              configMapKeyRef:
                name: hostname-config
                key: postgres_host
          - name: TLS-CERTIFICATE
            valueFrom:
              secretKeyRef:
                name: f-tls
                key: Certificate.p12
          - name: TLS-PASSWORD
            valueFrom:
              secretKeyRef:
                name: f-tls
                key: password
Run Code Online (Sandbox Code Playgroud)

这就是我在 Kubernetes 中创建秘密的方式:

kubectl create secret generic f-tls --from-file=Certificate.p12 --from-literal=password=changeit
Run Code Online (Sandbox Code Playgroud)

当它部署时,我得到

State:         Waiting
  Reason:      CrashLoopBackOff
Last State:    Terminated
  Reason:      ContainerCannotRun
  Message:     oci runtime error: container_linux.go:247: starting container process caused "process_linux.go:295: setting oom score for ready process caused \"write /proc/13895/oom_score_adj: invalid argument\""
Run Code Online (Sandbox Code Playgroud)

当我从部署 yaml 中删除 Secrets 时,它工作正常,但我不明白这个问题的根本原因是什么。我正在使用谷歌云平台容器引擎。

Ste*_*hen 5

这个答案特定于 Springboot 应用程序,这就是所问的问题。

第 1 步:从密钥库或 p12 文件创建通用机密

kubectl create secret generic f-tls-secret --from-file=Certificate.p12 --from-literal=password=changeit
Run Code Online (Sandbox Code Playgroud)

第 2 步:使用部署对象将密钥安装到您的 pod

spec:
  containers:
  - image: eu.gcr.io/..../...
    volumeMounts:
      - name: tls
        mountPath: /workspace/resources/

  volumes:
    - name: tls
      secret: 
        secretName: f-tls-secret
Run Code Online (Sandbox Code Playgroud)
  1. 在 application.properties 文件中配置 SSL
#Setup SSL
 server.port: 8443
 server.ssl.key-store: classpath:resources/Certificate.p12
 server.ssl.key-store-password: ${TLS_PASSWORD}
 server.ssl.keyStoreType: PKCS12
 server.ssl.keyAlias fundtr
Run Code Online (Sandbox Code Playgroud)