-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CA certiticates auto renew schedule or playbook renew CA certificates #10486
Comments
This can probably be provided by things like cert-manager, or already exists for some certs in kubespray, depending on which ones you means. |
/close |
@VannTen: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I just came across this request and think it is a valid kubespray use-case, specifically for rotating the CA that is used for issuing all the other k8s certs (admin.conf, apiserver, apiserver-kubelet-client, controller-manager.conf, etc.) For example, kubeadm shows my cert expirations as so:
We know every time we upgrade, kubespray will naturally rotate all the certs under the top section (as that is a feature provided by kubeadm out-the-box I believe). But it would be nice if kubespray could automatically handle the rotation of the CA itself. Kubernetes docs note how kubeadm doesn't support this and provide manual steps to rotate the CA, but I feel like automating this is within the kubespray feature-set, though I understand it may be a significant undertaking. Thoughts? @VannTen |
Yeah, that would be an interesting addition, especially considering Kubernetes had it's 10-year anniversary and Kubespray isn't too far from it either. Root CA expiration for existing clusters is probably not an urgent concern (I doubt too many people still have clusters started in 2015) but it will grow in probability with time, so it's certainly worth it to handle this.
I don't auto renew would work, but as part of an upgrade, that's certainly possible. The linked procedure does not seem that complicated, that would need to be translated to Ansible.
Can't really say how hard it would be, except that our certificates generation right now is not super great, that's one of the many areas that needs refactoring.
|
/triage accepted
|
What would you like to be added:
Handle root CA rotation during upgrade as described in Kubernetes docs
Why is this needed:
Kubeadm does not handle the root ca rotation, and while they have a long duration by default (10 years), those would eventually expires.
#10486 (comment)
The text was updated successfully, but these errors were encountered: