How do I replace a non public facing K3s active cluster with corperate signed CA certs? #12563
-
Here is a post with more details about this topic. The problem is I need to use cooperate signed certs on our K3s cluster, they must be signed by our PKI. Cannot use lets encrypt, should not be using any other CA to sign the certs. Also, not sure its possible to get a intermediate signing certs for K3s to use. Is there a way to replace certs manually for K3s with contents of a .pfx generated cert from our corporate CA?
The post has our system versioning if you need to know that. Anyway to accomplish this? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
Please see the docs at https://docs.k3s.io/cli/certificate#using-custom-ca-certificates
Note that this is a terrible idea. Golang and kubernetes do not support CRL checking, so if you ever need to revoke a compromised certificate you'll need to replace your entire internal PKI structure. If you use a standalone PKI for the Kubernetes cluster this is easy, all you need to do is rotate the certs and restart a bunch of things. If you use your corp PKI for the cluster then you're signing up to rekey everything in your entire enterprise. Use a corp PKI for your ingress controller if you must, so that you have valid certs things that will be exposed externally. Do not use your corp PKI for the cluster CA. |
Beta Was this translation helpful? Give feedback.
I would not recommend trying to rotate an existing cluster from the default autogenerated CA to an existing corp CA, especially if you are struggling to understand all the moving pieces. Build a new cluster that uses your corp certs from the start, as covered in the docs.