You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/certificate-rotation.md
+19-9Lines changed: 19 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,20 +60,29 @@ For AKS to automatically rotate non-CA certificates, the cluster must have [TLS
60
60
> [!Note]
61
61
> If you have an existing cluster you have to upgrade that cluster to enable Certificate Auto-Rotation.
62
62
63
-
For any AKS clusters created or upgraded after March 2022 Azure Kubernetes Service will automatically rotate non-ca certificates on both the control plane and agent nodes within 80% of the client certificate valid time, before they expire with no downtime for the cluster.
63
+
For any AKS clusters created or upgraded after March 2022 Azure Kubernetes Service will automatically rotate non-CA certificates on both the control plane and agent nodes within 80% of the client certificate valid time, before they expire with no downtime for the cluster.
64
64
65
-
#### How to check whether current agent node pool is TLS Bootstrapping enabled?
66
-
To verify if TLS Bootstrapping is enabled on your cluster browse to the following paths. On a Linux node: /var/lib/kubelet/bootstrap-kubeconfig, on a Windows node, it’s c:\k\bootstrap-config.
65
+
### How to check whether current agent node pool is TLS Bootstrapping enabled?
66
+
67
+
To verify if TLS Bootstrapping is enabled on your cluster browse to the following paths:
68
+
69
+
* On a Linux node: */var/lib/kubelet/bootstrap-kubeconfig*
70
+
* On a Windows node: *C:\k\bootstrap-config*
71
+
72
+
To access agent nodes, see [Connect to Azure Kubernetes Service cluster nodes for maintenance or troubleshooting][aks-node-access] for more information.
67
73
68
74
> [!Note]
69
-
> The file path may change as k8s version evolves in the future.
75
+
> The file path may change as Kubernetes version evolves in the future.
70
76
71
-
> [!IMPORTANT]
72
-
>Once a region is configured either create a new cluster or upgrade 'az aks upgrade -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME' an existing cluster to set that cluster for auto-cert rotation.
77
+
Once a region is configured, create a new cluster or upgrade an existing cluster with `az aks upgrade` to set that cluster for auto-certificate rotation. A control plane and node pool upgrade is needed to enable this feature.
78
+
79
+
```azurecli
80
+
az aks upgrade -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME
81
+
```
73
82
74
83
### Limitation
75
84
76
-
Auto cert rotation won't be enabled on non-rbac cluster.
85
+
Auto certificate rotation won't be enabled on a non-RBAC cluster.
77
86
78
87
## Manually rotate your cluster certificates
79
88
@@ -98,7 +107,7 @@ az aks rotate-certs -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME
98
107
Verify that the old certificates are no longer valid by running a `kubectl` command. Since you have not updated the certificates used by `kubectl`, you will see an error. For example:
99
108
100
109
```console
101
-
$ kubectl get no
110
+
$ kubectl get nodes
102
111
Unable to connect to the server: x509: certificate signed by unknown authority (possibly because of "crypto/rsa: verification error" while trying to verify candidate authority certificate "ca")
103
112
```
104
113
@@ -111,7 +120,7 @@ az aks get-credentials -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME --overwrite-exis
111
120
Verify the certificates have been updated by running a `kubectl` command, which will now succeed. For example:
112
121
113
122
```console
114
-
kubectl get no
123
+
kubectl get nodes
115
124
```
116
125
117
126
> [!NOTE]
@@ -127,3 +136,4 @@ This article showed you how to automatically rotate your cluster's certificates,
0 commit comments