-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot delete keypair secrets #8944
Comments
@justinsb decided to mention you, as this issue can have a critical impact on cluster stability (unable to rotate credentials - i just have a cluster down because TLS certs expired and can't rotate them). Similar issue has been already reported several times and always seems to be auto-closed, without any triage or discussion. Issue exists at least since version Ability to correctly rotate credentials is a critical maintenance task, required in cluster operations. |
Workaround: delete |
After deleting the objects above, did you manage to continue? /assign |
What worked for me as the whole process for credentials rotation was in end effect much more complicated:
After that login via ssh to each master and delete certs from EBS volume: Reboot all master nodes After this step, etcd should create a working cluster correctly, using new certificates Next, i've proceeded with "deleting all service accounts" as described in |
Recreating issue #6482 which was closed due to inactivity. This is confirmed bug, we just lost our whole cluster created with kops and we can't rotate credentials using method described on https://github.com/kubernetes/kops/blob/master/docs/rotate-secrets.md - so we have complete kubernetes cluster down right now and the problem described in this issue prevents us from bringing cluster back online, following official docs. Hence, ropening a valid and important ticket.
this information.
$ kops version
Version 1.11.0, has also been confirmed with 1.15.0 and 1.16.0.
version if a cluster is running or provide the Kubernetes version specified as
a kops flag.
Irrelevant.
AWS
$ kops delete secret keypair kube-controller-manager
I0219 15:22:22.716650 15341 certificate.go:106] Ignoring unexpected PEM block: "RSA PRIVATE KEY"
error deleting secret: error deleting certificate: error loading certificate "s3:////pki/private/kube-controller-manager/.key": could not parse certificate
5. What happened after the commands executed?
They failed.
I expect them to remove the kube-controller-manager keypair, according to your documentation https://github.com/kubernetes/kops/blob/master/docs/rotate-secrets.md
kops get --name my.example.com -o yaml to display your cluster manifest.
You may want to remove your cluster name and other sensitive information.
Irrelevant to this issue.
Paste the logs into this report, or in a gist and provide the gist link here.
$ kops delete secret keypair kube-controller-manager -v10
I0219 15:23:35.129669 15348 factory.go:68] state store s3:///
I0219 15:23:35.409810 15348 s3context.go:194] found bucket in region "eu-central-1"
I0219 15:23:35.409867 15348 s3fs.go:220] Reading file "s3:////config"
I0219 15:23:36.054560 15348 s3fs.go:257] Listing objects in S3 bucket "" with prefix "/pki/private/kube-controller-manager/"
I0219 15:23:36.095834 15348 s3fs.go:285] Listed files in s3:////pki/private/kube-controller-manager: [s3:////pki/private/kube-controller-manager/.key s3:////pki/private/kube-controller-manager/keyset.yaml]
I0219 15:23:36.096162 15348 s3fs.go:220] Reading file "s3:////pki/private/kube-controller-manager/.key"
I0219 15:23:36.170662 15348 certificate.go:106] Ignoring unexpected PEM block: "RSA PRIVATE KEY"
error deleting secret: error deleting certificate: error loading certificate "s3:////pki/private/kube-controller-manager/.key": could not parse certificate
9. Anything else do we need to know?
Please don't let your bots close this issue and take it seriously.
This was already reported in #5318
The text was updated successfully, but these errors were encountered: