Certificate Rotation
caution
Rotating Kubernetes certificates may result in your cluster being temporarily unavailable as components are restarted. For production environments, it’s recommended to perform this action during a maintenance window.
By default, Kubernetes clusters require certificates and Rancher launched Kubernetes clusters automatically generate certificates for the Kubernetes components. Rotating these certificates is important before the certificates expire as well as if a certificate is compromised. After the certificates are rotated, the Kubernetes components are automatically restarted.
Certificates can be rotated for the following services:
- RKE
RKE2
etcd
- kubelet (node certificate)
- kubelet (serving certificate, if enabled)
- kube-apiserver
- kube-proxy
- kube-scheduler
kube-controller-manager
admin
- api-server
- controller-manager
- scheduler
- rke2-controller
- rke2-server
- cloud-controller
- etcd
- auth-proxy
- kubelet
- kube-proxy
note
For users who didn’t rotate their webhook certificates, and they have expired after one year, please see this page for help.
Certificate Rotation
Rancher launched Kubernetes clusters have the ability to rotate the auto-generated certificates through the UI.
In the upper left corner, click ☰ > Cluster Management.
On the Clusters page, go to the cluster you want to rotate certificates for amd click ⋮ > Rotate Certificates.
Select which certificates that you want to rotate.
- Rotate all Service certificates (keep the same CA)
- Rotate an individual service and choose one of the services from the drop-down menu
- Click Save.
Results: The selected certificates will be rotated and the related services will be restarted to start using the new certificate.
Additional Notes
- RKE
- RKE2
Even though the RKE CLI can use custom certificates for the Kubernetes cluster components, Rancher currently doesn’t allow the ability to upload these in Rancher launched Kubernetes clusters.
In RKE2, both etcd and control plane nodes are treated as the same server
concept. As such, when rotating certificates of services specific to either of these components will result in certificates being rotated on both. The certificates will only change for the specified service, but you will see nodes for both components go into an updating state. You may also see worker only nodes go into an updating state. This is to restart the workers after a certificate change to ensure they get the latest client certs.