-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Example configs for using external Certificates #638
Comments
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/assign @liztio /cc @stealthybox |
/active |
There's a bunch of different parts to fixing this.
|
Spoke to @Bradamant3, we both agree a list of certs required and the hierarchy needed would be useful to more than just kubeadm. I'm going to make that list, which will also function as documentation for kubeadm, commit it upstream, and then link from our kubeadm docs. |
initial PR for certificate documentation added to k8s/website |
Working on part 3. Copied from #sig-cluster-lifecycle:
|
@timothysc I think we should classify this as a bug (well it is), and target v1.11 |
Hi, Per questions from #sig-cluster-lifecycle, I wonder if there's a 1-on-1 mapping reference documentation for certificate and keys generated from Currently the use case is, to verify an engineer handcrafted Kubernetes cluster, we have to handcraft another one to verify each step correctness. Maybe there's some way could verify this full automatically, we are willing to know. The ideal goal is, the certs and keys generated from Kelsey's tutorial shall be interchangeable with those from kubeadm, in both ways. Thanks. |
When using Kubeadm generated CA certs, all kubectl commands fail due to unknown signing CA. Documentation for using External CA is not clear, please provide examples
The text was updated successfully, but these errors were encountered: