question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

microk8s v1.24 - refresh-certs doesn't seem to refresh certs

See original GitHub issue

Summary

i have microk8s 1.24 and i need to grant access to the cluster via FQDN … I edited csr.conf.template and i refreshed the certificates as follow

sudo microk8s refresh-certs --cert server.crt sudo microk8s refresh-certs --cert front-proxy-client.crt

i didn’t refresh the ca.ctr because apparently i would have to rebuild the cluster " Warning: refreshing the root CA requires nodes to leave and re-join the cluster" unfortunately it’s not yet working… when i connect to the API server via the FQDN i get connection rejected

Unable to connect to the server: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster, kubernetes.default.svc.cluster.local, not [xxxxx.com](http://xxxxx.com/)

i was only able to make it work, after @neoaggelos suggested as workaround, to run sudo snap set microk8s dummy="$(date)"

What Should Happen Instead?

refresh certs should work

Reproduction Steps

add a DNS entry to csr.conf.template and refresh certs

Introspection Report

inspection-report-20220612_111958.tar.gz

Can you suggest a fix?

Are you interested in contributing with a fix?

Issue Analytics

  • State:open
  • Created a year ago
  • Reactions:3
  • Comments:9 (1 by maintainers)

github_iconTop GitHub Comments

2reactions
HazyFishcommented, Sep 16, 2022

Same on v1.25

1reaction
anubisg1commented, Oct 22, 2022

@neoaggelos is there a reasonable workaround for this? Without this it’s not possible to have the microk8s control plane behind a load balancer.

The workaround is sudo snap set microk8s dummy="$(date)" as described in my initial report

Read more comments on GitHub >

github_iconTop Results From Across the Web

Renew Certificate in MicroK8S Cluster - Discuss Kubernetes
So I logged onto the 1st node, and checked the certificates with: sudo microk8s refresh-certs -c. and determined they were expiring in 5 ......
Read more >
Troubleshooting - MicroK8s
If a pod is not behaving as expected, the first port of call should be the logs. First determine the resource identifier for...
Read more >
Kubernetes – A nice guy's view on life - Jon
Click on the topmost line of the list, and then click “View Certificate” to see the root certificate. Click on “Details”: The (obscured)...
Read more >
Cert-Manager and Nginx Ingress Setup with Examples
How to Set Up Cert-Manager and Nginx Ingress Controller with Platform9 Kubernetes ... Published on August 24, 2021 • Last updated December 6,...
Read more >
Let's Encrypt kubernetes Ingress Controller issuing Fake ...
You can add a default certificate to use if your nginx controller doesn't find one ... For me, the issue was ingress class...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found