Skip to content

Commit 2fd80cd

Browse files
committed
Freshness pass: Certificate rotation in AKS
1 parent 9df2b66 commit 2fd80cd

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/aks/certificate-rotation.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@ AKS generates and uses the following certificates, Certificate Authorities (CA),
3333
All certificates mentioned in this section, except for the cluster certificate, are maintained by Microsoft.
3434

3535
> [!NOTE]
36-
> AKS clusters created prior to May 2019 have certificates that expire after two years. Any cluster created after May 2019 or any cluster that has its certificates rotated have Cluster CA certificates that expire after 30 years. All other AKS certificates, which use the Cluster CA for signing, expired after two years and were automatically rotated during an AKS version upgrade which occurred after 8/1/2021.
36+
>
37+
> * **AKS clusters created *before* May 2019** have certificates that expire after two years.
38+
> * **AKS clusters created *after* May 2019** have Cluster CA certificates that expire after 30 years.
3739
>
3840
> You can verify when your cluster was created using the `kubectl get nodes` command, which shows you the *Age* of your node pools.
3941

0 commit comments

Comments
 (0)