We encountered an issue where replacing KSQL's SSL certificates with a new set signed by a different Certificate Authority (CA) causes KSQL to enter a CrashLoopBackOff state. The issue arises because Kafka brokers and KSQL use one trust chain, while KSQL’s REST API uses a different trust chain.
When using a new CA for either trust chain, KSQL fails to start. However, replacing certificates while keeping the same CA for both trust chains works without issues.
Environment DetailsKSQL should start successfully with any valid CA-signed certificate, provided the keystore and truststore are correctly updated for both Kafka and KSQL REST communications.
Actual BehaviorKSQL crashes when using a new CA-signed certificate for either trust chain, but works fine when using a different certificate signed by the original CA.
Request for HelpHas anyone faced this issue before? Are there additional steps needed to reload certificates when using separate trust chains for Kafka and KSQL REST? Any insights or workarounds would be greatly appreciated!
Thanks & Regards
Divya