Skip to content

Commit a468879

Browse files
authored
Remove order in certificate rotation (#409)
* Remove order in certificate rotation Signed-off-by: manuelbuil <[email protected]>
1 parent 4d51041 commit a468879

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

docs/security/certificates.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,8 @@ In case of unexpected output, please use `--debug` flag to get more information
4747

4848

4949
### Rotating Client and Server Certificates Manually
50-
When rotating client and server certificates manually, rotate certs on each node in the following order:
51-
1. etcd servers
52-
2. control-plane servers
53-
3. agents
5450

55-
For each node, stop the server, use the `rke2 certificate rotate` subcommand to rotate the certs, then start the server once more; as in the following example:
51+
To rotate client and server certificates manually, use the `rke2 certificate rotate` subcommand:
5652

5753
```bash
5854
# Stop RKE2
@@ -74,6 +70,12 @@ rke2 certificate rotate --service <SERVICE>,<SERVICE>
7470
The following certificates can be rotated:
7571
`admin`, `api-server`, `controller-manager`, `scheduler`, `rke2-controller`, `rke2-server`, `cloud-controller`, `etcd`, `auth-proxy`, `kubelet`, `kube-proxy`.
7672

73+
:::info Version Gate
74+
Prior to the January 2025 releases: v1.32.0+rke2r1, v1.31.5+rke2r1, v1.30.9+rke2r1, v1.30.13+rke2r1, the rotation of certificates must be done in the following order: etcd servers, control-plane server, agents
75+
:::
76+
77+
78+
7779
## Certificate Authority (CA) Certificates
7880

7981
Kubernetes requires a number of CA certificates for proper operation. For more information on how Kubernetes uses CA certificates, see the Kubernetes [PKI Certificates and Requirements](https://kubernetes.io/docs/setup/best-practices/certificates/#all-certificates) documentation.

0 commit comments

Comments
 (0)