Skip to content

Commit b2796b9

Browse files
committed
OCPBUGS-20101: Adding additional info on node certificates
1 parent aa250ae commit b2796b9

File tree

1 file changed

+20
-1
lines changed

1 file changed

+20
-1
lines changed

security/certificate_types_descriptions/node-certificates.adoc

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,31 @@ toc::[]
88

99
== Purpose
1010

11-
Node certificates are signed by the cluster; they come from a certificate authority (CA) that is generated by the bootstrap process. After the cluster is installed, the node certificates are auto-rotated.
11+
Node certificates are signed by the cluster and allow the kubelet to communicate with the Kubernetes API server. They come from the kubelet CA certificate, which is generated by the bootstrap process.
12+
13+
== Location
14+
15+
The kubelet CA certificate is located in the `kube-apiserver-to-kubelet-signer` secret in the `openshift-kube-apiserver-operator` namespace.
1216

1317
== Management
1418

1519
These certificates are managed by the system and not the user.
1620

21+
== Expiration
22+
23+
Node certificates are automatically rotated after 292 days and expire after 365 days.
24+
25+
== Renewal
26+
27+
The Kubernetes API Server Operator automatically generates a new `kube-apiserver-to-kubelet-signer` CA certificate at 292 days. The old CA certificate is removed after 365 days. Nodes are not rebooted when a kubelet CA certificate is renewed or removed.
28+
29+
Cluster administrators can manually renew the kubelet CA certificate by running the following command:
30+
31+
[source,terminal]
32+
----
33+
$ oc annotate -n openshift-kube-apiserver-operator secret kube-apiserver-to-kubelet-signer auth.openshift.io/certificate-not-after-
34+
----
35+
1736
[discrete]
1837
[role="_additional-resources"]
1938
== Additional resources

0 commit comments

Comments
 (0)