Operator v 1.7.0 will have a full LDAP support
Support all MongoDB configurations in Kubernetes CRD so that it is possible to deploy a fine-tuned cluster with Kubernetes resources11 votes
Backups normaly protect from accidental deletion of a database. In a devOps environment it can happen that a MDB resource gets deleted by a Kubernetes deployment. At the moment, Ops Manager then deactivates the backup and deletes all snapshots. We would like to have the snapshots stored as long as their retention limit tells or at least until the project itself is deleted in Ops Manager.
So that, if a developer detects the mistake and re-deploys the MDB resource(s), someone or even himself can restore the database(s) from the backups.7 votes
We do not delete Ops Manager project when Backup is present.
This has been addressed
Many customers require that the MMS automation agent has a valid x509 for TLS communications with Ops Manager. With the Kubernetes Operator this is not currently possible so these customers cannot use the Operator to deploy MongoDB instances within their environments.
This feature would improve the security of communications between agents and the Ops Manager and meet the security requirements of many of our customers who cannot move to services like Atlas.7 votes
new spec option spec.agent.startupOptions is available. it can be used to configure client Certificates.
PodSecurityPolicies are a way to enhance security in a k8s cluster.
Currently the Kubernetes Operator and the Helm Chart does not offer a way to integrate PSPs. If an administrator wants to enforce PSPs for the cluster where the MongoDB Kubernetes Operator is deployed, he would need to do this manually which leads to additional manual steps (e.g. editing the Operator role to allow "use" "psp").
Please introduce a way to secure the MongoDB Management (Ops Manager, Operator) and Workload (MongoDB custom resources) with PSPs in the Kubernetes Operator / Helm ecosystem.4 votes
Ops Manager should support SCRAM-SHA-256 authentication mechanism when connecting to Backing Databases
Currently, Ops Manager does not provide support to SCRAM-SHA-256 authentication mechanism when connecting to the Backing Database.
This is because the version of MongoDB Java Driver which is in use by Ops Manager 4.2.0 is 3.6.4.
SCRAM-SHA-256 is supported by the Java Driver from the version 3.8.4 votes
Add K8S namespace as a tag in Ops Manager project so it is easier to identify what project belongs in what namespace3 votes
Currently there is a time lag between the Ops Manager version releases and the availability of K8S images to be used with the MongoDB Kubernetes Operator.
It would be nice if they are released at the same time.2 votes
We now update Ops Manager images on the same day with Ops manager releases.
Deploy MongoDB Ops Manager in Kubernetes with Operator that will allow MongoDB Clusters to be run and managed from Kubernetes platform entirely2 votes
Support SCRAM authentication for MongoDB Users2 votes
OpsManager Pod should not have credentials in environment variables but store and retrieve from a k8s secret
OpsManager database password is exposed as environment variable.
OMPROPmongo_mongoUri holds credentials of the OpsManager Database.
OpsManager Pod should not have credentials in environment variables but store and retrieve from a k8s secret.1 vote
We moved all passwords to a secret
Currently in MongoDB Kubernetes Operator 1.4.2 the pods are run under a specific service user named "mongodb-enterprise-database-pods".
It would be nice to be able to specify a custom service user name to be able to comply to specific enterprise user definition rules.1 vote
Allow custom Annotations on MongoDB CR so it would be easier to label multiple clusters1 vote
Support UBI as a base image for OpenShift deployemnts1 vote
Add capability to add Taints and Tolerations to K8S Operator pod spec for different types of pods0 votes
Operator can not accept full PodSpecTemplate. Taints could be configured using normal K8S functions
- Don't see your idea?