You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
kubeadm: improvements to the cert management documentation (#18397)
- move the sections about custom certificates and external CA
to the kubeadm-certs page
- minor cleanups to the kubeadm-certs page, including updated output
for the check-expiration command
- link the implementation details page to the new locations
for custom certs and external CA
Copy file name to clipboardExpand all lines: content/en/docs/reference/setup-tools/kubeadm/implementation-details.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -150,12 +150,12 @@ Certificates are stored by default in `/etc/kubernetes/pki`, but this directory
150
150
1. If a given certificate and private key pair both exist, and its content is evaluated compliant with the above specs, the existing files will
151
151
be used and the generation phase for the given certificate skipped. This means the user can, for example, copy an existing CA to
152
152
`/etc/kubernetes/pki/ca.{crt,key}`, and then kubeadm will use those files for signing the rest of the certs.
153
-
See also [using custom certificates](/docs/reference/setup-tools/kubeadm/kubeadm-init/#custom-certificates)
153
+
See also [using custom certificates](/docs/tasks/administer-cluster/kubeadm/kubeadm-certs#custom-certificates)
154
154
2. Only for the CA, it is possible to provide the `ca.crt` file but not the `ca.key` file, if all other certificates and kubeconfig files
155
155
already are in place kubeadm recognize this condition and activates the ExternalCA , which also implies the `csrsigner`controller in
156
156
controller-manager won't be started
157
-
3. If kubeadm is running in [ExternalCA mode](/docs/reference/setup-tools/kubeadm/kubeadm-init/#external-ca-mode); all the certificates must be provided by the user,
158
-
because kubeadm cannot generate them by itself
157
+
3. If kubeadm is running in [external CA mode](/docs/tasks/administer-cluster/kubeadm/kubeadm-certs#external-ca-mode);
158
+
all the certificates must be provided by the user, because kubeadm cannot generate them by itself
159
159
4. In case of kubeadm is executed in the `--dry-run` mode, certificates files are written in a temporary folder
160
160
5. Certificate generation can be invoked individually with the [`kubeadm init phase certs all`](/docs/reference/setup-tools/kubeadm/kubeadm-init-phase/#cmd-phase-certs) command
CERTIFICATE EXPIRES RESIDUAL TIME EXTERNALLY MANAGED
36
-
admin.conf May 15, 2020 13:03 UTC 364d false
37
-
apiserver May 15, 2020 13:00 UTC 364d false
38
-
apiserver-etcd-client May 15, 2020 13:00 UTC 364d false
39
-
apiserver-kubelet-client May 15, 2020 13:00 UTC 364d false
40
-
controller-manager.conf May 15, 2020 13:03 UTC 364d false
41
-
etcd-healthcheck-client May 15, 2020 13:00 UTC 364d false
42
-
etcd-peer May 15, 2020 13:00 UTC 364d false
43
-
etcd-server May 15, 2020 13:00 UTC 364d false
44
-
front-proxy-client May 15, 2020 13:00 UTC 364d false
45
-
scheduler.conf May 15, 2020 13:03 UTC 364d false
63
+
CERTIFICATE EXPIRES RESIDUAL TIME CERTIFICATE AUTHORITY EXTERNALLY MANAGED
64
+
admin.conf Dec 30, 2020 23:36 UTC 364d no
65
+
apiserver Dec 30, 2020 23:36 UTC 364d ca no
66
+
apiserver-etcd-client Dec 30, 2020 23:36 UTC 364d etcd-ca no
67
+
apiserver-kubelet-client Dec 30, 2020 23:36 UTC 364d ca no
68
+
controller-manager.conf Dec 30, 2020 23:36 UTC 364d no
69
+
etcd-healthcheck-client Dec 30, 2020 23:36 UTC 364d etcd-ca no
70
+
etcd-peer Dec 30, 2020 23:36 UTC 364d etcd-ca no
71
+
etcd-server Dec 30, 2020 23:36 UTC 364d etcd-ca no
72
+
front-proxy-client Dec 30, 2020 23:36 UTC 364d front-proxy-ca no
73
+
scheduler.conf Dec 30, 2020 23:36 UTC 364d no
74
+
75
+
CERTIFICATE AUTHORITY EXPIRES RESIDUAL TIME EXTERNALLY MANAGED
76
+
ca Dec 28, 2029 23:36 UTC 9y no
77
+
etcd-ca Dec 28, 2029 23:36 UTC 9y no
78
+
front-proxy-ca Dec 28, 2029 23:36 UTC 9y no
46
79
```
47
80
48
81
The command shows expiration/residual time for the client certificates in the `/etc/kubernetes/pki` folder and for the client certificate embedded in the KUBECONFIG files used by kubeadm (`admin.conf`, `controller-manager.conf` and `scheduler.conf`).
`kubeadm` renews all the certificates during control plane [upgrade](/docs/tasks/administer-cluster/kubeadm/kubeadm-upgrade/).
106
+
kubeadm renews all the certificates during control plane [upgrade](/docs/tasks/administer-cluster/kubeadm/kubeadm-upgrade/).
74
107
75
108
This feature is designed for addressing the simplest use cases;
76
109
if you don't have specific requirements on certificate renewal and perform Kubernetes version upgrades regularly (less than 1 year in between each upgrade), kubeadm will take care of keeping your cluster up to date and reasonably secure.
0 commit comments