Skip to content

Commit 7dadd72

Browse files
authored
Merge pull request #8024 from deveshdama/main
AB#3444: update docs for cronjob removal.
2 parents f68e055 + 7881999 commit 7dadd72

File tree

1 file changed

+2
-31
lines changed

1 file changed

+2
-31
lines changed

support/azure/azure-kubernetes/extensions/istio-add-on-plug-in-ca-certificate.md

Lines changed: 2 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Istio service mesh add-on plug-in CA certificate troubleshooting
33
description: Learn how to do plug-in CA certificate troubleshooting on the Istio service mesh add-on for Azure Kubernetes Service (AKS).
4-
ms.date: 07/16/2024
4+
ms.date: 03/04/2025
55
author: deveshdama
66
ms.author: ddama
77
editor: v-jsitser
@@ -43,7 +43,7 @@ This article discusses common troubleshooting issues with the Istio add-on plug-
4343

4444
- For the cluster to auto-detect changes in the Azure Key Vault secrets, you have to enable [auto-rotation](/azure/aks/csi-secrets-store-configuration-options#enable-and-disable-auto-rotation) for the Azure Key Vault secrets provider add-on.
4545

46-
- Although changes to the intermediate certificate are applied automatically, changes to the root certificate are only picked up by the control plane after the `istiod` deployment is restarted by a cronjob that the add-on deploys, as explained in the [Deployed resources](#deployed-resources) section. This cronjob runs at a 10-minute interval.
46+
- Changes to the root and intermediate certificates are applied automatically.
4747

4848
## Enable the Istio add-on to use a plug-in CA certificate
4949

@@ -119,35 +119,6 @@ As part of the add-on deployment for the plug-in certificates feature, the follo
119119
-----END CERTIFICATE-----
120120
```
121121

122-
- The `istio-cert-validator-cronjob-asm-1-21` [cronjob object](https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/) is created in the `aks-istio-system` namespace. This cronjob is scheduled to run every 10 minutes to check for updates on the root certificate. If the root certificate that's in the `cacerts` Kubernetes secret doesn't match the `istio-ca-root-cert` configmap in the `aks-istio-system` namespace, it restarts the `istiod-asm-1-21` deployment:
123-
124-
```bash
125-
kubectl get cronjob --namespace aks-istio-system
126-
```
127-
128-
```output
129-
NAME SCHEDULE SUSPEND ACTIVE
130-
istio-cert-validator-cronjob-asm-1-21 */10 * * * * False 0
131-
```
132-
133-
You can run the following command to check the cronjob logs for the last run:
134-
135-
```bash
136-
kubectl logs --namespace aks-istio-system $(kubectl get pods --namespace aks-istio-system | grep 'istio-cert-validator-cronjob-' | sort -k8 | tail -n 1 | awk '{print $1}')
137-
```
138-
139-
This command generates one of the following output messages, depending on whether a root certificate update was detected:
140-
141-
```output
142-
Root certificate update not detected.
143-
```
144-
145-
```output
146-
Root certificate update detected. Restarting deployment...
147-
deployment.apps/istiod-asm-1-21 restarted
148-
Deployment istiod-asm-1-21 restarted.
149-
```
150-
151122
## Determine certificate type in deployment logs
152123

153124
You can view the `istiod` deployment logs to determine whether you have a self-signed CA certificate or a plug-in CA certificate. To view the logs, run the following command:

0 commit comments

Comments
 (0)