Manage Event Exposure
The onboarding and credential management of Event Exposure services are available under the Certificates menu on the top of the ESC Portal.
The menu is only visible for those, who hold the required administrator roles.
Administrator roles
Credential management is only available for the users that have the corresponding vRA custom user role. The tenant manager can assign this role either directly to users or via Custom Groups that have this role.
Managing the user roles is possible using the vRA Portal, which can be opened from the top right corner of the ESC Portal.
Onboarding/offboarding
Upon first opening the Certificates menu on the top of the ESC Portal, the onboarding to the service is done automatically.
Currently there is no self-service offboarding process defined. If this is required, please contact the ESC support.
Certificate management
User Certificate Creation
Access to the service is controlled using TLS certificates.
The certificates issued by the service are valid for 1 year and are signed by the Log Exposure Certificate Authority (CA), which in turn is signed by the Swisscom Datacenter CA.
New certificates can be created on the Certificates menu on the top of the ESC Portal by providing the following information:
Field | Mandatory | Description |
---|---|---|
Description | No | Free text description of the certificate |
Yes | The email to notify before certificate expiration | |
CSR | Yes | The user's certificate signing request |
Consumer Group | Yes | The Kafka consumer group |
Email:
The email is used by the service for certificate expiration notifications (see the Certificate Renewal section). Hence, it is recommended that this is a team mailbox or the email of a distribution list.
Certificate Signing Request(CSR):
The user must provide a certificate signing request (CSR) with the following constraints:
- Subject: must only contain the common name (
CN
) in the format:<prefix>-<tenant>-<your_free_text>
. E.g.logs-orion-123-my-new-certificate
where:<prefix>
is a service specific prefixhealth
for Health Exposurelogs
for Log Exposure
<tenant>
is your tenant name, e.g.orion-123
<your_free_text>
is a free-text matching the following regular expression:[a-z0-9-]*[a-z0-9]
. E.g.my-new-certificate
- Key Usage: if any is provided, the list must include TLS Web Client Authentication (
clientAuth
)
The examples below show how you can create a CSR simply using the openssl
command:
# if you already have a private key saved in the private_key.pem file
openssl req -new -key private_key.pem -out csr.pem -subj "/CN=logs-orion-123-my-user-certificate"
# if you don't have a private key and you want to generate one in the private_key.pem
openssl req -newkey rsa:3072 -keyout private_key.pem -out csr.pem -subj "/CN=logs-orion-123-my-user-certificate"
While the ESC Portal will directly accept the plain text CSR, the API requires it as Base64-encoded text. To obtain this, run:
openssl base64 -A -in csr.pem
Consumer Group:
This field allows you to control the Kafka consumer topology.
- Using different consumer groups, the consumers would consume the same Kafka topic in parallel, each one receiving all the events.
- Having a shared consumer group shared between multiple certificates, the corresponding consumers will compete for the same events in a topic and each event will reach only one of the consumers.
Certificate Renewal
Starting 90 days before the expiration date (1 year after creation), an email notification will be sent weekly to the email address used during certificate creation.
An existing certificate cannot be renewed, instead a new one has to be created by following the instructions in the Certificate Creation section.
To stop the weekly expiration notification, delete the expiring certificate using the ESC Portal. If you can't see your existing certificate, please contact the ESC support to have this certificate removed and the notification stopped.