Closed kingsd041 closed 2 years ago
SANs should be added to the dynamiclistener cert on demand, based on the SNI hostname requested by the client. Try running the following on the server:
curl -vk --resolve 172.31.13.97:6443:127.0.0.1 https://172.31.13.97:6443/ping
This repository uses a bot to automatically label issues which have not had any activity (commit/comment/label) for 180 days. This helps us manage the community issues better. If the issue is still relevant, please add a comment to the issue so the bot can remove the label and we know it is still valid. If it is no longer relevant (or possibly fixed in the latest release), the bot will automatically close the issue in 14 days. Thank you for your contributions.
SANs should be added to the dynamiclistener cert on demand, based on the SNI hostname requested by the client. Try running the following on the server:
curl -vk --resolve 172.31.13.97:6443:127.0.0.1 https://172.31.13.97:6443/ping
This is sooo cool. It solved a great problem for me. But could you please give me some explain for me. ChatGPT doest not help...
Environmental Info: K3s Version: v1.20.7+k3s1
Node(s) CPU architecture, OS, and Version:
Linux ip-172-31-6-197 4.15.0-1044-aws #46-Ubuntu SMP Thu Jul 4 13:38:28 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
Cluster Configuration: 1 server
Describe the bug:
Update the k3s cluster and add the
--tls-san
option. After the update is successful, the corresponding ip is not added to thek3s-serving
Steps To Reproduce:
--tls-san
optionExpected behavior:
172.31.13.97
is added to theannotations
list of secret k3s-servingActual behavior:
172.31.13.97
is not added to theannotations
list of secret k3s-serving, and k3s API cannot be accessed through172.31.13.97
Additional context / logs: