Root Certificate Authority Rotation
The following document describes how to rotate the certificate authority certificates in use and renewing certificates for all components with a new root CA.
This procedure is not necessary if you don’t want to exchange your root CA but just renew certificates.
Further information can be found in the official Kubernetes documentation.
General Procedure description
There are three Vault PKI engines configured for each cluster: - k8s-pki - etcd-pki - k8s-front-proxy-pki
We must rotate the certificate authorities for each of them. To do so, a new issuer is added to each PKI engine. Depending on your setup, you may use root CAs or intermediate CAs for that.
After a new issuer has been added to each PKI engine, we start the transition process. This process consists of two phases.
In the first phase, the new CAs are added to the accepted CA bundles for each Kubernetes control plane component and made available in the cluster. To accept the new CA bundles, each component must be restarted. Furthermore, kubeconfigs get renewed but certificates in use by control plane components get not, yet. After this phase, the renewed kubeconfigs should be spread. Each workload will and must be restarted to renew its credentials (i.e. API tokens, ConfigMaps and Secrets).
In the second phase, the old CAs are removed from the accepted CA bundles for each Kubernetes control plane component. Furthermore, certificates for all Kubernetes control plane components get renewed and issued by the newly introduced issuer. To omit the old CA and ensure connectivity among components, each component must be restarted. Each workload will and must be restarted to renew its credentials. As we renewed the kubeconfigs with the new issuer in the first phase, we’re still able to talk to the Kubernetes API during this phase.
Note
In each phase we must update the CA ConfigMap for the prometheus-adapter and rollout restart it as it is otherwise unable to scrape metrics. This is done automatically, but we may fly blind for a few moments.
Executing a CA rotation
Please substitute your <clustername>
in the following.
To verify your configured clustername you can use the following:
$ tomlq --raw-output '.vault.cluster_name' config/config.toml
devcluster
Phase 1
Start with single issuer which is currently the default
$ # Verify currently configured issuers $ vault list -detailed yaook/<clustername>/k8s-pki/issuers Keys is_default issuer_name ---- ---------- ----------- 06a9511a-ffd2-2ce3-bd01-2cb2180a5e51 true n/a $ vault list -detailed yaook/<clustername>/etcd-pki/issuers [...] $ vault list -detailed yaook/<clustername>/k8s-front-proxy-pki/issuers [...]
Add a new issuer which will be called
next
to all PKIs$ ./managed-k8s/tools/vault/rotate-root-ca-root.sh prepare $ # Verify $ vault list -detailed yaook/<clustername>/k8s-pki/issuers $ vault list -detailed yaook/<clustername>/etcd-pki/issuers $ vault list -detailed yaook/<clustername>/k8s-front-proxy-pki/issuers
Generate CSRs
$ ./managed-k8s/tools/vault/rotate-root-ca-intermediate.sh prepare
Sign the generated CSRs
Import the signed certificates as new issuer “next”
$ ./managed-k8s/tools/vault/rotate-root-ca-intermediate.sh load-signed-intermediates $ # Verify $ vault list -detailed yaook/<clustername>/k8s-pki/issuers $ vault list -detailed yaook/<clustername>/etcd-pki/issuers $ vault list -detailed yaook/<clustername>/k8s-front-proxy-pki/issuers
If you’ve created your cluster before 2024, you must additionally update your vault policies
Note
You must have sourced a root token to update vault policies.
$ ./managed-k8s/tools/vault/init.sh
Run the rotation action to roll out both CAs in the cluster and create kubeconfigs issued by the “next” CA but trusting both CAs.
$ MANAGED_K8S_RELEASE_THE_KRAKEN=true ./managed-k8s/actions/rotate-root-ca.sh -n
Verify workload is able to come back up
Verify the logs of all Kubernetes components
Run the smoke tests
$ ./managed-k8s/actions/test.sh
Distribute the renewed kubeconfig(s) to the clients that need them (e.g. customers). The kubeconfig in the cluster repo is updated automatically (you have to commit and push it, of course!).
Phase 2
After you spread the kubeconfigs, do the following:
Rotate the issuer and set the new one has default, mark the old issuer as outdated.
$ ./managed-k8s/tools/vault/rotate-root-ca-root.sh apply $ vault list -detailed yaook/<clustername>/k8s-pki/issuers Keys is_default issuer_name ---- ---------- ----------- 06a9511a-ffd2-2ce3-bd01-2cb2180a5e51 false prev 3e836f42-047f-b078-3795-0386aaff30c0 true n/a $ vault list -detailed yaook/<clustername>/etcd-pki/issuers [...] $ vault list -detailed yaook/<clustername>/k8s-front-proxy-pki/issuers [...]
$ ./managed-k8s/tools/vault/rotate-root-ca-intermediate.sh apply $ vault list -detailed yaook/<clustername>/k8s-pki/issuers Keys is_default issuer_name ---- ---------- ----------- 06a9511a-ffd2-2ce3-bd01-2cb2180a5e51 false prev 3e836f42-047f-b078-3795-0386aaff30c0 true n/a $ vault list -detailed yaook/<clustername>/etcd-pki/issuers [...] $ vault list -detailed yaook/<clustername>/k8s-front-proxy-pki/issuers [...]
Complete the rotation by removing the old CA from accepted bundles and renewing certificates for all components
$ MANAGED_K8S_RELEASE_THE_KRAKEN=true ./managed-k8s/actions/rotate-root-ca.sh -c
Verify workload is able to come back up
Verify the logs of all Kubernetes components
Run the smoke tests
$ ./managed-k8s/actions/test.sh