You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Client certificates generated by [kubeadm](/docs/reference/setup-tools/kubeadm/) expire after 1 year. This page explains how to manage certificate renewals with kubeadm.
13
+
Client certificates generated by [kubeadm](/docs/reference/setup-tools/kubeadm/) expire after 1 year.
14
+
This page explains how to manage certificate renewals with kubeadm. It also covers other tasks related
15
+
to kubeadm certificate management.
14
16
15
17
## {{% heading "prerequisites" %}}
16
18
@@ -126,13 +128,13 @@ command. In that case, you should explicitly set `--certificate-renewal=true`.
126
128
127
129
You can renew your certificates manually at any time with the `kubeadm certs renew` command.
128
130
129
-
This command performs the renewal using CA (or front-proxy-CA) certificate and key stored in `/etc/kubernetes/pki`.
131
+
This command performs the renewal using CA (or front-proxy-CA) certificate and key stored in `/etc/kubernetes/pki`.
130
132
131
133
After running the command you should restart the control plane Pods. This is required since
132
134
dynamic certificate reload is currently not supported for all components and certificates.
133
135
[Static Pods](/docs/tasks/configure-pod-container/static-pod/) are managed by the local kubelet
134
136
and not by the API Server, thus kubectl cannot be used to delete and restart them.
135
-
To restart a static Pod you can temporarily remove its manifest file from `/etc/kubernetes/manifests/`
137
+
To restart a static Pod you can temporarily remove its manifest file from `/etc/kubernetes/manifests/`
136
138
and wait for 20 seconds (see the `fileCheckFrequency` value in [KubeletConfiguration struct](/docs/reference/config-api/kubelet-config.v1beta1/).
137
139
The kubelet will terminate the Pod if it's no longer in the manifest directory.
138
140
You can then move the file back and after another `fileCheckFrequency` period, the kubelet will recreate
@@ -289,3 +291,52 @@ Such a controller is not a secure mechanism unless it not only verifies the Comm
289
291
in the CSR but also verifies the requested IPs and domain names. This would prevent
290
292
a malicious actor that has access to a kubelet client certificate to create
291
293
CSRs requesting serving certificates for any IP or domain name.
294
+
295
+
## Generating kubeconfig files for additional users {#kubeconfig-additional-users}
296
+
297
+
During cluster creation, kubeadm signs the certificate in the `admin.conf` to have
298
+
`Subject: O = system:masters, CN = kubernetes-admin`.
0 commit comments