Skip to content

Commit ba788f7

Browse files
authored
Merge pull request #66117 from bergerhoffer/OCPBUGS-20101
OCPBUGS#20101: Adding info on kubelet CA certs
2 parents c1a9794 + b2796b9 commit ba788f7

File tree

1 file changed

+20
-1
lines changed

1 file changed

+20
-1
lines changed

security/certificate_types_descriptions/node-certificates.adoc

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,31 @@ toc::[]
88

99
== Purpose
1010

11-
Node certificates are signed by the cluster; they come from a certificate authority (CA) that is generated by the bootstrap process. After the cluster is installed, the node certificates are auto-rotated.
11+
Node certificates are signed by the cluster and allow the kubelet to communicate with the Kubernetes API server. They come from the kubelet CA certificate, which is generated by the bootstrap process.
12+
13+
== Location
14+
15+
The kubelet CA certificate is located in the `kube-apiserver-to-kubelet-signer` secret in the `openshift-kube-apiserver-operator` namespace.
1216

1317
== Management
1418

1519
These certificates are managed by the system and not the user.
1620

21+
== Expiration
22+
23+
Node certificates are automatically rotated after 292 days and expire after 365 days.
24+
25+
== Renewal
26+
27+
The Kubernetes API Server Operator automatically generates a new `kube-apiserver-to-kubelet-signer` CA certificate at 292 days. The old CA certificate is removed after 365 days. Nodes are not rebooted when a kubelet CA certificate is renewed or removed.
28+
29+
Cluster administrators can manually renew the kubelet CA certificate by running the following command:
30+
31+
[source,terminal]
32+
----
33+
$ oc annotate -n openshift-kube-apiserver-operator secret kube-apiserver-to-kubelet-signer auth.openshift.io/certificate-not-after-
34+
----
35+
1736
[discrete]
1837
[role="_additional-resources"]
1938
== Additional resources

0 commit comments

Comments
 (0)