-
Notifications
You must be signed in to change notification settings - Fork 288
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auto Renewing Etcd Certs #5400
Comments
This person has a PR into etcdadm to expose a renew certs cli like kubeadm has - https://serverfault.com/questions/1054126/etcd-database-cluster-certificate-renewal-for-kubernets-external-database-setup These code changes were tested and renews the certs appropriately. One complication here is, etcdadm generates a cert on each etcd node for api-server's etcd client. Each of these certs have the etcd node's name as CN on the cert. Instead of using this, etcdam controller should create a cert, update the secret on the cluster, which kubeadm controllers should pick up and update the api-server, like it happens on a create or upgrade workflow. Unfortunately, this might roll out nodes, we have to figure out a way to update the certs without rolling out nodes. |
We might need to prioritize some recommendation around this in the meantime: #8778 |
What would you like to be added:
Etcdadm generates a root CA that is valid for 10 years. In addition to the root CA, etcdadm generates the following certs for normal operation of etcd. These are created for external etcd stack, kubeadm handles stacked etcd certificates.
All these four certs have an expiry of 1 year. If there is no upgrade operation on the cluster that involves rolling out all old machines with new OS/nodes, these certs are not renewed and are at risk of expiry. At expiration, etcd fails to operate and api-server will not serve any requests, followed by workload failures.
EKS-A should
The text was updated successfully, but these errors were encountered: