Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] Expired client certificate causes cluster access failure #676

Open
Yzi opened this issue May 15, 2024 · 2 comments
Open

[BUG] Expired client certificate causes cluster access failure #676

Yzi opened this issue May 15, 2024 · 2 comments
Assignees
Labels
bug Something isn't working
Milestone

Comments

@Yzi
Copy link

Yzi commented May 15, 2024

Describe the bug
Expired client certificate causes cluster access failure.

To reproduce
Steps to reproduce the behavior:

  1. Create a cluster. The default client certificate is valid for one year.
  2. Within one year, the k3s version was manually upgraded, but the default client certificate was not updated.
  3. One year later, the client certificate expired, causing access to the cluster to fail.

Expected behavior
The client certificate is automatically updated and the cluster can be accessed.

Screenshots
If applicable, add screenshots to help explain your problem.

Environments (please complete the following information):

  • OS: [e.g. Darwin Bigsur]
  • AutoK3s Version v0.9.2

Additional context
Add any other context about the problem here.

@Yzi Yzi added the bug Something isn't working label May 15, 2024
@Jason-ZW Jason-ZW added this to the backlog milestone May 15, 2024
@JacieChao
Copy link
Collaborator

@Yzi Thanks for your feedback.

So can I confirm that the K3s certificate can be rotated automatically by the K3s server, after that, the K3s cluster works properly and you can use kubectl on the K3s server properly?
However, AutoK3s is not aware of the certificate change of the K3s cluster. It can't use the existing kubeconfig file(which contains the expired client certificate) to access the K3s cluster.

@Yzi
Copy link
Author

Yzi commented May 24, 2024

The k3s service works normally.
Manually download the certificate automatically rotated by the K3s server, then replace the kubeconfig in the autok3s home directory, restart autok3s and restore access to the k3s service.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Development

No branches or pull requests

3 participants