Skip to content

Provide proper certificates for kube-scheduler and kube-controller-manager #2244

Open
@FrediWeber

Description

@FrediWeber

FEATURE REQUEST

Versions

kubeadm version (use kubeadm version): 1.18.6

Environment:

  • Kubernetes version (use kubectl version): 1.18.6
  • Cloud provider or hardware configuration: Bare-Metal
  • OS (e.g. from /etc/os-release): Debian 10
  • Kernel (e.g. uname -a): 4.19.0-9
  • Others:

What happened?

Kubeadm disables the "insecure" ports of kube-scheduler and kube-controller-manager by setting the --port=0 flag. Therefore metrics have to be scaped over TLS. This is fine but Kubeadm doesn't seem to manage the certificates of kube-scheduler and kube-controller manager. These components - if no certificate is provided - will create a self signed certificate to serve requests. One could just disable certificate verification but that would somehow defer the use of TLS.

What you expected to happen?

Kubeadm should create and manage certificates for the "secure" port of kube-scheduler and kube-controller-manager. These certificates should be signed by the CA, that is created by Kubeadm.

How to reproduce it (as minimally and precisely as possible)?

  1. Create a cluster with Kubeadm
  2. Access the "secure" port (10257 or 10259)

Metadata

Metadata

Assignees

No one assigned

    Labels

    area/securitykind/designCategorizes issue or PR as related to design.kind/featureCategorizes issue or PR as related to a new feature.lifecycle/frozenIndicates that an issue or PR should not be auto-closed due to staleness.priority/awaiting-more-evidenceLowest priority. Possibly useful, but not yet enough support to actually get it done.

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions