We need a method to allow password less “authorized” connections into influxdb while the rest can use the password method and we need both the default 8086 port to work and may be ssl_port ( if reqd ) to work simultaneously.
Is this possible and any white papers there to help ?
Basically looking a similar set up like this mysql link for the ssl certs part
I followed ths steps to create self signed certs and activated ssl
but this step is not working ( as this influxdb host does not have a default private key although I did create my own rootCA.pem but unable to use it to sign the client cert )
location :
part 2 of step 1
Sign if you manage the CA with openssl
sudo openssl ca -infiles /etc/ssl/.csr -out /etc/ssl/.crt
worklog
$ sudo openssl ca -in /etc/ssl/dbadmin-influx.csr -out /etc/ssl/dbadmin-influx.crt Using configuration from /etc/pki/tls/openssl.cnf
Error opening CA private key /etc/pki/CA/private/cakey.pem
139978423945120:error:02001002:system library:fopen:No such file or directory:bss_file.c:398:fopen(‘/etc/pki/CA/private/cakey.pem’,‘r’)
139978423945120:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:400:
unable to load CA private key
$
Now I can use the following sample to sign my cert with my own rootCA but I did not sign the influxdb cert with that … so how does this work out!
My confusion now leads me to the self signed client certs issue.
I signed the client cert with CN as the influxdb username !
for the test I added to influxdb config
https-enabled = true
# The SSL certificate to use when HTTPS is enabled.
https-certificate = "/etc/ssl/influxdb-selfsigned.crt"
# Use a separate private key location.
https-private-key = "/etc/ssl/influxdb-selfsigned.key"
# The SSL certificate used to validate client certificates
#https-ca-certificate = "/etc/ssl/<ca-certificate-file>.crt"
https-ca-certificate = "/etc/ssl/rootCA.pem"
this is the same rootCA.pem i used to sign the client crt ( it seems thats needed )
still having issue !
Error :
curl: (60) Peer's certificate issuer has been marked as not trusted by the user.
More details here: http://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.