Open
Description
FEATURE REQUEST
Versions
kubeadm version (use kubeadm version
): 1.18.6
Environment:
- Kubernetes version (use
kubectl version
): 1.18.6 - Cloud provider or hardware configuration: Bare-Metal
- OS (e.g. from /etc/os-release): Debian 10
- Kernel (e.g.
uname -a
): 4.19.0-9 - Others:
What happened?
Kubeadm disables the "insecure" ports of kube-scheduler and kube-controller-manager by setting the --port=0
flag. Therefore metrics have to be scaped over TLS. This is fine but Kubeadm doesn't seem to manage the certificates of kube-scheduler and kube-controller manager. These components - if no certificate is provided - will create a self signed certificate to serve requests. One could just disable certificate verification but that would somehow defer the use of TLS.
What you expected to happen?
Kubeadm should create and manage certificates for the "secure" port of kube-scheduler and kube-controller-manager. These certificates should be signed by the CA, that is created by Kubeadm.
How to reproduce it (as minimally and precisely as possible)?
- Create a cluster with Kubeadm
- Access the "secure" port (10257 or 10259)