-
Notifications
You must be signed in to change notification settings - Fork 716
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kubeadm: support cert rotation or configurable cert expiration #2652
Comments
@chendave: This issue is currently awaiting triage. If a SIG or subproject determines this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Technically, there should be no obstacle to implement this, but something worth to do it or not. @neolit123 I am trying to find something I could contribute to kubeadm in the past few weeks, and found this is something might be considered as a feature. I'd like to hear from you, and I'd happy to draft a KEP if you are positive on this, thanks! /sig cluster-lifecycle |
/transfer kubeadm |
hello, i moved this ticket to k/kubeadm where we are supposed to track kubeadm tickets..
this is not possible because kubeadm does not run as a service, kubeadm operates as a one-shot CLI execution tool. note that the scope of the operator is more complex than just cert rotation. do you want to work on the operator and revisit the old KEP or write a new one?
as mentioned above, kubelet is a service that runs constantly on the nodes, unlike kubeadm.
this has been discussed multiple times in the past, and was mostly rejected. for production users have multiple options:
|
also, forgot to mention, we are making a very good point here that we already support automatic cert renewal as part of upgrade:
|
Thanks @neolit123 for your feedback!
yes, I forgot that kubelet need to interlock with apiserver to achieve that and kubeadm is not a service.
sure, I will take a look and get back to you later. |
ok, operator work is tracked here: |
@neolit123 I did some research in the past few days, do you have any ideas why it's removed? it would be helpful if we have the experimental code, we can start the work on top of that. |
@chendave IIRC, it was experimental and we did not have the time to focus more work on it at the time. if you'd like you can start working on a POC in a repository of yours. |
What would you like to be added?
https://github.com/kubernetes/kubernetes/blob/2047936f3f8ddd96498dcc812631b5368d14f3be/cmd/kubeadm/app/util/pkiutil/pki_helpers.go#L654-L657
Why is this needed?
kubeadm will refresh certs when the control plane are updated, and provide the command to renew certs. But haven't provided a feature to rotate the cert when the cert expiration is approaching. And actually, this feature is already implemented in kubelet.
The text was updated successfully, but these errors were encountered: