I have been running K8s cluster(v1.13.5) for a year and the control plane certs and Kubelet certs are about to expire. I found a way to rotate all the control plane certs and I wanted to know how to rotate the Kubelet certs. Can someone help me to understand how to rotate the K certs for worker node and master (if needed)? This K8s cluster is deployed using Kubespray.
1 Answers
From Kubernetes version 1.8.0 a beta feature is available Certificate Rotation.
The kubelet uses certificates for authenticating to the Kubernetes API. By default, these certificates are issued with one year expiration so that they do not need to be renewed too frequently.
Kubernetes 1.8 contains kubelet certificate rotation, a beta feature that will automatically generate a new key and request a new certificate from the Kubernetes API as the current certificate approaches expiration. Once the new certificate is available, it will be used for authenticating connections to the Kubernetes API.
This needs to be enabled with Feature Gates because this is a beta feature. So you need to add
--feature-gates=RotateKubeletClientCertificate=true
When a kubelet starts up, if it is configured to bootstrap (using the
--bootstrap-kubeconfig
flag), it will use its initial certificate to connect to the Kubernetes API and issue a certificate signing request. You can view the status of certificate signing requests using:
kubectl get csr
Initially a certificate signing request from the kubelet on a node will have a status of
Pending
. If the certificate signing requests meets specific criteria, it will be auto approved by the controller manager, then it will have a status ofApproved
. Next, the controller manager will sign a certificate, issued for the duration specified by the--experimental-cluster-signing-duration
parameter, and the signed certificate will be attached to the certificate signing requests.The kubelet will retrieve the signed certificate from the Kubernetes API and write that to disk, in the location specified by
--cert-dir
. Then the kubelet will use the new certificate to connect to the Kubernetes API.As the expiration of the signed certificate approaches, the kubelet will automatically issue a new certificate signing request, using the Kubernetes API. Again, the controller manager will automatically approve the certificate request and attach a signed certificate to the certificate signing request. The kubelet will retrieve the new signed certificate from the Kubernetes API and write that to disk. Then it will update the connections it has to the Kubernetes API to reconnect using the new certificate.

- 10,232
- 2
- 26
- 31
-
Do I need to add "--feature-gates=RotateKubeletClientCertificate=true" to both the master and worker ? – rolz Mar 03 '20 at 03:34
-
1It needs to be enable on all nodes, but keep in mind you have `RotateKubeletClientCertificate` and `RotateKubeletServerCertificate` – Crou Mar 03 '20 at 08:27