Files
docs/doc/source/security/kubernetes/https-access-overview.rst
Ron Stone f843d3daa4 HTTPS cert updates
General update to Security/HTTPS and Certificates Management:
- reorganization
- content updates
Implement patchset 1 review comments
Implement patchset 2 review comments

Closes-Bug: 2028184

Signed-off-by: Ron Stone <ronald.stone@windriver.com>
Change-Id: Iae75785e479c96751fb50a097eba8ed5e6069e94
2023-07-24 11:51:39 +00:00

20 KiB

HTTPS and Certificates Management Overview

Certificates are required for secure HTTPS access and authentication on platform.

This table lists all the platform certificates, and indicates which certificates are automatically created/renewed by the system versus which certificates must be manually created/renewed by the system administrator.

Platform certificates that are associated with optional platform components are only present if the optional platform component is configured (e.g. ). Platform certificates that are associated with Distributed Cloud are only present on SystemController systems or Subclouds.

Certificate Auto Created Renewal Status
Etcd:
etcd Root CA certificate Yes NOT AUTO-RENEWED; Default expiry is set at 10 years
etcd server certificate Yes auto-renewed by cron job
etcd client certificate Yes auto-renewed by cron job
kube-apiserver's etcd client certificate Yes auto-renewed by cron job
Kubernetes:
Kubernetes Root CA Certificate Yes NOT AUTO-RENEWED; Default expiry is set at 10 years; MUST be renewed via CLI.
Cluster Admin client certificate used by kubectl Yes auto-renewed by cron job
kube-controller-manager client certificate Yes auto-renewed by cron job
kube-scheduler client certificate Yes auto-renewed by cron job
kube-apiserver server certificate Yes auto-renewed by cron job
kube-apiserver's kubelet client certificate Yes auto-renewed by cron job
kubelet client certificate Yes auto-renewed by kubelet. Feature enabled by default
front-proxy-client Yes front-proxy-client: auto-renewed by cron job
front-proxy-ca Yes front-proxy-ca: NOT AUTO-RENEWED; Default expiry is set at 10 years
system-local-ca Yes NOT AUTO-RENEWED. MUST be renewed via CLI
OpenLDAP Server Certificate Yes auto-renewed by system
StarlingX REST API & HORIZON Server Certificate Yes (But the auto-created certificate is self-signed and should be changed) auto-renewed if configured with cert-manager; NOT AUTO-RENEWED if configured with system certificate-install .., must be renewed via CLI
Local Registry Server Certificate Yes (But the auto-created certificate is self-signed and should be changed) auto-renewed if configured with cert-manager; NOT AUTO-RENEWED if configured with system certificate-install .., must be renewed via CLI
OIDC:
OIDC Client and Dex Server Server Certificate No auto-renewed if configured with cert-manager; NOT AUTO-RENEWED if configured with an externally generated certificate. MUST be renewed via CLI.
OIDC Client and Dex Server CA certificate No NOT AUTO-RENEWED. MUST be renewed via CLI.
OIDC Remote WAD CA Certificate No NOT AUTO-RENEWED. MUST be renewed via CLI.
Vault:
Vault Server Certificate Yes NOT AUTO-RENEWED; MUST be renewed via CLI.
Vault Root CA certificate Yes NOT AUTO-RENEWED; MUST be renewed via CLI.
Portieris:
Portieris Server Certificate Yes Auto renewed by cert-manager; BUT CUSTOMER MUST restart Portieris after the certificate is renewed
Portieris remote registry and notary server CA Certificate No NOT AUTO-RENEWED; CUSTOMER MUST renew via CLIs
DC Admin Endpoints:
Root CA DC Admin Endpoint CA Certificate Yes auto-renewed
Intermediate CA DC Admin Endpoint CA Certificate Yes auto-renewed
DC Admin Endpoint Server Certificate Yes auto-renewed
System trusted CA Certificates No NOT AUTO-RENEWED as these are certificates that are not necessarily owned by the platform

Where:

  • Auto created: the certificate is generated during system deployment or triggered by certain operations.
  • Renewal Status: whether the certificate is renewed automatically by the system when expiry date approaches.

The specific certificates, and details such as expiration date, that are present on a system can be displayed with a local script, sudo show-certs.sh, see utility-script-to-display-certificates.

monitors the installed certificates on the system by raising alarms for expired certificates and certificates that will expire soon, see alarm-expiring-soon-and-expired-certificates-baf5b8f73009.

The following sections also provide details on creating and/or renewing the platform certificates.