Replies: 1 comment 2 replies
-
|
There is no support for this flow right now in Talos Linux. The idea is to use always per-cluster unique PKI, which is more secure than trying to link it some CA which is shared. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Hello,
We are trying to setup a cluster with an existing PKI featuring a root CA and one intermediate CA per use case (etcd, kubernetes, front-proxy).
We were able to import everything with
--from-kubernetes-pkiand bootstrap the cluster.Logs
Clients from pods are not able to validate the API server certificate :
Our debug
It seems like the root CA is missing, and we confirmed from talos source code that the root CA is not properly loaded.
We have found that on this file :
internal/app/machined/pkg/controllers/k8s/control_plane_static_pod.goAs we can see, cluster-signing-cert-file is forced to be equal to root-ca-file. On our PKI, we have an intermediate CA so those arguments should not be the same.
What happens on our Kubernetes cluster :
On some on-premise cluster without Talos, we are able to configure both args with different certs.
Is this an actual limitation of Talos CA ? Did we miss somethings maybe ? We already have the same setup working on kubeadm clusters.
From our point of view, it could be nice if we could overwrite these parameters.
Thanks you so much for your help
Environment
Beta Was this translation helpful? Give feedback.
All reactions