Replies: 1 comment
-
Can you do this, just as rank paranoia? inspect_cert () {
sub_selector='\(.extensions.subject_key_id | .[0:16])... \(.subject_dn)'
iss_selector='\(.extensions.authority_key_id // "................" | .[0:16])... \(.issuer_dn)'
step certificate inspect --format json \
| jq -r "\"Issuer: $iss_selector\",\"Subject: $sub_selector\""
}
echo "Trust anchor:"
kubectl get configmap -n cert-manager linkerd-identity-trust-roots \
-o jsonpath='{ .data.ca-bundle\.crt }' \
| inspect_cert
echo ""
echo "Identity issuer:"
kubectl get secret -n linkerd linkerd-identity-issuer \
-o jsonpath='{ .data.ca\.crt }' \
| base64 -d | inspect_cert That should output something like
depending on how exactly you've set up the trust anchor in cert-manager, but the critical bit is that it's looking at the things that Linkerd should be looking at, and the Based on what you're saying about your cert-manager setup, this should already be the case, but it's the first thing I'd want to check. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Linkerd Check Passes
All pods are unable to restart, because they fail with certificate related errors.
both clusters broke, within a week of upgrading to "2025.6.1". No amount of restarting etc would fix anything.
To fix, we had to remove linkerd, unmesh everything, re-create all certificates and re-deploy.
Beta Was this translation helpful? Give feedback.
All reactions