-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[LFX-2024-Jun-Aug]Karmada Certificate Lifecycle Management #69
Comments
Hy @XiShanYongYe-Chang @RainbowMango The next thing is for Visibility enhancement. We have to integrate this feature into the existing karmada cli right? |
+1, there might be an option to integrate cert-manager.
This tasks isn't for managing certification for member clusters, it is for Karmada's components like
That's the idea that we can build the capability into CLI tool(karmadactl). |
Thanks for sharing the information |
@RainbowMango @XiShanYongYe-Chang
|
Hello @RainbowMango, |
hy @RainbowMango , @XiShanYongYe-Chang could you please address the above query? |
@RainbowMango Can you please disclose the name of the person who get selected for this project? |
@AdityaRaimec22 will do that, probably by this week. |
@RainbowMango I've opened up a PR that addresses some of these concerns around certificate lifecycle management, automatic renewals, and a better PKI hierarchy (e.g. not issuing everything off the single root) It took a bit of effort to get things working with the mounts and kubeconfigs, but my PR is in a place where it's ready for feedback and testing. With the support for automatic renewal, I was able to drop the validity period of the certificates down to 30 days. Short lived certificates are better for security. I've already had Karmada deployed for over 30 days using my chart and the rotation worked flawlessly. |
Hii @RainbowMango Can I get to know the criteria for selection in LFX via your organisation? I also applied for being a mentee in LFX via your org. |
Now karmada cannot be used normally due to the expiration of the certificate. The issue was raised in April. Can this problem be solved now? Is there a solution?
karmada version
|
Currently, we have been running Karamada for one year and our certificate is facing expiration. How can we renew the certificate. Does it support features like |
Currently @yizhang-zen and @zhzhuang-zju are working on this. But I'm afraid it's too late for you to expect the new features, as new features will not applied to old releases. By the way, are you present on the https://karmada.io/adopters/? |
@RainbowMango See the https://karmada.io/adopters/ I'm in vipkid |
@RainbowMango karmada is the former operation and maintenance, integrated our own development of cmdb system, their level is very high, I now take over to do some operation and maintenance work, looking forward to the community to solve this problem |
@pptfz May I ask how did you install Karmada and do you have any special configuration for your certificates? |
By looking at the internal wiki, we found that the code used here for installation is the previous operation and maintenance operations https://github.com/lfbear/karmada/tree/vk_prod
|
If the certificate has expired and you want to replace it manually, first find the CA that issued the expired certificate. Then, use the CA to issue a new certificate. Update the new certificate in the secret mounted by the component, and restart the component for the changes to take effect. |
Ok, I will try to operate it, but I have to make sure that the actual situation here can operate in this way to avoid other effects, thank you very much |
The |
Description:
The Karmada Certificate Lifecycle Management project is dedicated to systematically addressing the challenges faced by Karmada users related to certificate management, particularly those stemming from expiration issues that can disrupt services and compromise security. The project will achieve this through four core objectives:
Certificate Visibility Enhancements: Develop a feature within the Karmada platform that enables users to effortlessly inspect and monitor the certificates of its components, presenting vital details such as type, issuer, and, most importantly, expiration dates. This functionality will incorporate early warning notifications to inform users well ahead of imminent certificate expirations.
Manual Replacement Guidelines: Produce a thorough, step-by-step manual for replacing certificates in Karmada, catering to diverse deployment scenarios and encompassing best practices, potential obstacles, and troubleshooting advice. The document will be crafted for clarity and user-friendliness, integrating visual aids, screenshots, and sample command-line instructions to facilitate a seamless certificate replacement process.
Configurable Certificate Validity during Deployment: Guarantee that Karmada's deployment tools, comprising the CLI, Helm charts, and Operator, afford users the option to define preferred certificate validity periods during installation or upgrades. This will empower users to align certificate lifecycles with their organization's security policies and maintenance schedules from the very beginning.
Automated Certificate Rotation Capabilities: Design and integrate a mechanism for automated certificate rotation either within Karmada itself or by leveraging existing open-source projects dedicated to certificate management. This feature will dramatically reduce the operational overhead associated with maintaining a secure and up-to-date certificate landscape across the Karmada ecosystem.
Expected Outcome:
Participants in the project under the CNCF LFX program are expected to deliver the following artifacts and outcomes upon successful completion of the project:
Certificate Visibility Tool/Feature:
Manual Certificate Replacement Guide:
Updated Installation Tools with Customizable Certificate Validity:
Automated Certificate Rotation Solution Design or Integration:
In addition to these tangible deliverables, participants are expected to:
By fulfilling these expectations, participants will contribute significantly to enhancing the overall certificate management experience for Karmada users, reducing the risk of service disruptions due to expired certificates and streamlining the process of maintaining a secure and compliant certificate infrastructure.
The text was updated successfully, but these errors were encountered: