You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, the addon-framework supports signing certificate requests on the spoke cluster. However, it appears to lack a renewal mechanism for signed certificates.
For example, when a certificate is signed using a CA via the registration process, it remains valid only as long as the CA is. If the CA expires or becomes invalid, and a new CA is issued, the signed certificate on the spoke cluster will no longer work.
The challenge is that there is no automated way to trigger the registration workflow to re-sign or update the certificate in the spoke cluster. Currently, the only available solution is to manually delete the certificate in the spoke cluster.
Open Question:
How can we automate the certificate renewal process in the spoke cluster when the CA changes?
One option is to add an optional filed authorityKeyIdentifier to registration config in the spec of ManagedClusterAddOn. If specified, the registration agent will compare the authorityKeyIdentifier in the ManagedClusterAddOn resource and the one extracted from the existing client certificate. If they are mismatch, a CSR will be sent to create a new client certificate.
Uh oh!
There was an error while loading. Please reload this page.
Currently, the addon-framework supports signing certificate requests on the spoke cluster. However, it appears to lack a renewal mechanism for signed certificates.
For example, when a certificate is signed using a CA via the registration process, it remains valid only as long as the CA is. If the CA expires or becomes invalid, and a new CA is issued, the signed certificate on the spoke cluster will no longer work.
The challenge is that there is no automated way to trigger the registration workflow to re-sign or update the certificate in the spoke cluster. Currently, the only available solution is to manually delete the certificate in the spoke cluster.
Open Question:
How can we automate the certificate renewal process in the spoke cluster when the CA changes?
The text was updated successfully, but these errors were encountered: