You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -110,34 +110,35 @@ az aks rotate-certs -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME
110
110
> [!IMPORTANT]
111
111
> It may take up to 30 minutes for `az aks rotate-certs` to complete. If the command fails before completing, use `az aks show` to verify the status of the cluster is *Certificate Rotating*. If the cluster is in a failed state, rerun `az aks rotate-certs` to rotate your certificates again.
112
112
113
-
Verify that the old certificates are no longer valid by running a`kubectl` command. Since you have not updated the certificates used by `kubectl`, you will see an error. For example:
113
+
Verify that the old certificates aren't valid by running any`kubectl` command. If you haven't updated the certificates used by `kubectl`, you'll see an error similar to the following example:
114
114
115
115
```console
116
-
$ kubectl get nodes
116
+
kubectl get nodes
117
117
Unable to connect to the server: x509: certificate signed by unknown authority (possibly because of "crypto/rsa: verification error" while trying to verify candidate authority certificate "ca")
118
118
```
119
119
120
-
Update the certificate used by `kubectl` by running `az aks get-credentials`.
120
+
To update the certificate used by `kubectl`, run the [az aks get-credentials][az-aks-get-credentials] command:
121
121
122
122
```azurecli
123
123
az aks get-credentials -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME --overwrite-existing
124
124
```
125
125
126
-
Verify the certificates have been updated by running a `kubectl` command, which will now succeed. For example:
126
+
To verify the certificates have been updated, run the following [kubectl get][kubectl-get] command:
127
127
128
128
```console
129
129
kubectl get nodes
130
130
```
131
131
132
132
> [!NOTE]
133
-
> If you have any services that run on top of AKS, you may need to update certificates related to those services as well.
133
+
> If you have any services that run on top of AKS, you might need to update their certificates.
134
134
135
135
## Next steps
136
136
137
137
This article showed you how to automatically rotate your cluster's certificates, CAs, and SAs. You can see [Best practices for cluster security and upgrades in Azure Kubernetes Service (AKS)][aks-best-practices-security-upgrades] for more information on AKS security best practices.
0 commit comments