You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: install_config/upgrades.adoc
+112Lines changed: 112 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1091,4 +1091,116 @@ Modify the *_/etc/origin/master/scheduler.json_* file to add the `*kind*` and
1091
1091
====
1092
1092
<1> Add `*"kind": "Policy",*`
1093
1093
<2> Add `*"apiVersion": "v1",*`
1094
+
1095
+
[[openshift-origin-pre-1-0-8-certificate-update]]
1096
+
==== OpenShift Origin Pre 1.0.8 Installation and Kubelet Certificates
1097
+
1098
+
The following steps may be required for any OpenShift instance which was originally installed
1099
+
previous to the https://github.com/openshift/origin/releases[OpenShift Origin 1.0.8 release].
1100
+
This may include any and all updates from that version.
1101
+
1102
+
With the 1.0.8 release, the certificates for each of the kubelet nodes were updated to include
1103
+
the IP address of the node. Any node certificates generated before the 1.0.8 release may not
1104
+
contain the IP address of the node.
1105
+
1106
+
If a node is missing the IP address as part of its certificate, clients may refuse to connect
1107
+
to the kubelet endpoint. Usually this will result in errors about the certificate not containing
1108
+
an `IP SAN`
1109
+
1110
+
In order to remedy this situation, you may need to manually update the certificates for your node.
1111
+
1112
+
*Checking the Node's Certificate*
1113
+
1114
+
The follow command can be used to determine what subject alt names are already in place for the
1115
+
node's serving certificate:
1116
+
1117
+
====
1118
+
----
1119
+
# openssl x509 -in /etc/origin/node/server.crt -text -noout | grep -A 1 "Subject Alternative Name"
1120
+
----
1121
+
====
1122
+
1123
+
If the output shows:
1124
+
====
1125
+
----
1126
+
X509v3 Subject Alternative Name:
1127
+
DNS:mynode, DNS:mynode.mydomain.com, IP: 1.2.3.4
1128
+
----
1129
+
====
1130
+
1131
+
then your subject alt names are:
1132
+
====
1133
+
----
1134
+
mynode
1135
+
mynode.mydomain.com
1136
+
1.2.3.4
1137
+
----
1138
+
====
1139
+
1140
+
You will now need to check that the `nodeIP` value in the *_/etc/origin/node/node-config.yaml_* configuration file. If this value
1141
+
does not match one of the IP values from the subject alternative names determined in the previous step then it will need to be added to the node's certificate.
1142
+
1143
+
If the `nodeIP` value is already contained within the subject alternative names, then no further steps are required.
1144
+
1145
+
You will need to know the `Subject Alternative Names` and `nodeIP` value for the following steps.
1146
+
1147
+
1148
+
*Generating a New Node Certificate*
1149
+
1150
+
If your current node certificate do not contain the proper IP address, then you will need to regenerate a new certificate for your node.
1151
+
1152
+
We will perform the following commands from a temporary directory:
1153
+
1154
+
====
1155
+
----
1156
+
# mkdir /tmp/node_certificate_update
1157
+
# cd /tmp/node_certificate_update
1158
+
----
1159
+
====
1160
+
1161
+
First we will export a variable to contain all our signing options:
0 commit comments