Closed zgfh closed 3 years ago
the note says the properties of the certs on disk (such as SAN) will be used for generating the new certs. to "keep them in sync" means that if you generated custom certs using your own process, make sure that e.g. kubeadm-config (ConfigMap) -> ClusterConfiguration -> apiServer -> extraSANs matches the SANs in the kube-apiserver certficate. (or the other way around).
but IIRC, kubeadm ... certs renew
fetches the kubeadm ClusterConfiguration before renewing if it can, so the above message seems false / out of date.
/assign @fabriziopandini to double check my understanding.
/triage support /sig cluster-lifecycle
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close
.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale
/remove-lifecycle stale
@neolit123 sorry for the late answer but this got somehow out of my radar.
If I follow the code right, we are still reading certificates details from disk at
and then using that to build the certificate config at
I guess we can close this then. The IIRC part of my message above is not correct.
/close
@neolit123: Closing this issue.
https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/#automatic-certificate-renewal
This confuses me,I thought I could not use this command, and I don't know how to keep them in sync. should we add the method how to keep them in sync ?