Closed nnlkcncff closed 2 weeks ago
This issue is currently awaiting triage.
SIG Docs takes a lead on issue triage for this website, but any Kubernetes member can accept issues by applying the triage/accepted
label.
The triage/accepted
label can be added by org members by writing /triage accepted
in a comment.
Page related to issue: https://kubernetes.io/docs/tasks/administer-cluster/certificates/ /language en
/retitle Generate Certificates Manually task is inconsistent /kind bug
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
/sig security /remove-lifecycle rotten
Let's triage this
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
/remove-lifecycle stale
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
The page contains three ways to achieve the same result using three different utilities. But there are some differences in the end results that are disconcerting and make you wonder why it has to be this way? It doesn't seem to make sense. There are two areas of concern — subject names and key usages.
1) All CA certificates have different subject Common Name:
${MASTER_IP}@date
${MASTER_IP}
kubernetes
According to PKI certificates and requirements page CA CN defaults to
kubernetes-ca
. It might be worth changing the documentation to use one common value.2) Some CA certificates have different X509v3 Key Usage:
To fix this, one can change the command in OpenSSL step 2 to the following:
3) Some kube-apiserver certificates have different X509v3 Key Usage and X509v3 Extended Key Usage:
To fix the easyrsa issue, one can change the string
extendedKeyUsage = serverAuth
in the fileserver
in the "x509-types" directory toextendedKeyUsage = serverAuth,clientAuth
:To fix the openssl issue, one can change the string
keyUsage=keyEncipherment,dataEncipherment
in OpenSSL step 4 tokeyUsage=digitalSignature,keyEncipherment
.4) Some kube-apiserver certificates have different subject Common Name and X509v3 Subject Alternative Name:
${MASTER_IP}
, IP Address:${MASTER_CLUSTER_IP}
, DNS:kubernetes, DNS:kubernetes.default, DNS:kubernetes.default.svc, DNS:kubernetes.default.svc.cluster, DNS:kubernetes.default.svc.cluster.local${MASTER_IP}
${MASTER_IP}
, IP Address:${MASTER_CLUSTER_IP}
${MASTER_IP}
, IP Address:${MASTER_CLUSTER_IP}
According to the PKI certificates and requirements CN should be
kube-apiserver
.As for SAN, consider using the same set of values (with or without localhost which can be in the form of an IP or hostname) and the order (DNS, loopback address, IP) for each method, for example:
Also there are different configuration or lack thereof for X509v3 Authority Key Identifier extension across all the certificates, but this is more of less OK.