-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatically renew machine certificates #6529
Comments
Following the original CAPI machine immutability principle machines can roll out with new certs. ..Yet there have been many talks about allowing in place upgrades on bare metal machines and similar. Certificate rotation can be also considered as mutable operation for bare metal machines that cannot easily roll out. I don't fully know the scope of the CAPI operator but the in place rotation might be a FR for it. |
AFAIK the scope of this iteration is renewing machine certs trough machine rotation (no in-place mutations) |
@sbueringer Does this issue refers to kubelet certs as well? If so it relates to #6317. In which case I'd expect us to design a holistic solution that would consider serving/client certs and creation/renewal. |
@enxebre Sorry I didn't have the time to add more details to the issue when I created it. Goal is specifically to renew the certificates/kubeconfigs on control plane nodes (i.e. the ones that kubeadm can renew as well: https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/#check-certificate-expiration) kubelet client certificates are already automatically rotated. kubelet serving certificates should be solved via the Kubelet Authentication CAEP / #6317. So I think we can and should treat those as separate topics. Additional info: the kubelet serving certificates are not and cannot be validated today by the apiserver as they are self-signed, so we don't have to renew them. (see below the full issue description / proposed solution) |
Background information
Goal of this issue is to rotate certificates and kubeconfigs of the control plane nodes. Proposed solution
Notes
Follow-up
|
Regarding
If |
User Story
As a user I would like to be able to configure ClusterAPI to automatically renew (machine) certificates.
Detailed Description
Today during machine bootstrap we create certificates via kubeadm with a 1 year expiry (e.g. apiserver serving certificates).
The goal of this issue is to make this expiry visible and to provide a way to automatically recreate machines before the certificates expire.
Anything else you would like to add:
Notes:
/kind feature
The text was updated successfully, but these errors were encountered: