Adding API server certificates

The default API server certificate is issued by an internal OKD cluster CA. Clients outside of the cluster will not be able to verify the API server’s certificate by default. This certificate can be replaced by one that is issued by a CA that clients trust.

Add an API server named certificate

The default API server certificate is issued by an internal OKD cluster CA. You can add one or more alternative certificates that the API server will return based on the fully qualified domain name (FQDN) requested by the client, for example when a reverse proxy or load balancer is used.

Prerequisites

  • You must have a certificate for the FQDN and its corresponding private key. Each should be in a separate PEM format file.

  • The private key must be unencrypted. If your key is encrypted, decrypt it before importing it into OKD.

  • The certificate must include the subjectAltName extension showing the FQDN.

  • The certificate file can contain one or more certificates in a chain. The certificate for the API server FQDN must be the first certificate in the file. It can then be followed with any intermediate certificates, and the file should end with the root CA certificate.

Do not provide a named certificate for the internal load balancer (host name api-int.<cluster_name>.<base_domain>). Doing so will leave your cluster in a degraded state.

Procedure

  1. Create a secret that contains the certificate chain and private key in the openshift-config namespace.

    1. $ oc create secret tls <secret> \(1)
    2. --cert=</path/to/cert.crt> \(2)
    3. --key=</path/to/cert.key> \(3)
    4. -n openshift-config
    1<secret> is the name of the secret that will contain the certificate chain and private key.
    2</path/to/cert.crt> is the path to the certificate chain on your local file system.
    3</path/to/cert.key> is the path to the private key associated with this certificate.
  2. Update the API server to reference the created secret.

    1. $ oc patch apiserver cluster \
    2. --type=merge -p \
    3. '{"spec":{"servingCerts": {"namedCertificates":
    4. [{"names": ["<FQDN>"], (1)
    5. "servingCertificate": {"name": "<secret>"}}]}}}' (2)
    1Replace <FQDN> with the FQDN that the API server should provide the certificate for.
    2Replace <secret> with the name used for the secret in the previous step.
  3. Examine the apiserver/cluster object and confirm the secret is now referenced.

    1. $ oc get apiserver cluster -o yaml

    Example output

    1. ...
    2. spec:
    3. servingCerts:
    4. namedCertificates:
    5. - names:
    6. - <FQDN>
    7. servingCertificate:
    8. name: <secret>
    9. ...
  4. Check the kube-apiserver operator, and verify that a new revision of the Kubernetes API server rolls out. It may take a minute for the operator to detect the configuration change and trigger a new deployment. While the new revision is rolling out, PROGRESSING will report True.

    1. $ oc get clusteroperators kube-apiserver

    Do not continue to the next step until PROGRESSING is listed as False, as shown in the following output:

    Example output

    1. NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE
    2. kube-apiserver 4.10.0 True False False 145m

    If PROGRESSING is showing True, wait a few minutes and try again.