Skip to content

Conversation

@GTRekter
Copy link
Contributor

@GTRekter GTRekter commented Jul 9, 2025

Added two warnings aimed at preventing misunderstandings about cert-manager automatically rotating certificates and clarifying the need for a manual step.

GTRekter added 2 commits July 9, 2025 21:48
Signed-off-by: Ivan Porta <[email protected]>
Signed-off-by: Ivan Porta <[email protected]>
@GTRekter GTRekter force-pushed the ivanp/cert-manager branch from 81a03b2 to fe8a186 Compare July 9, 2025 12:48
@travisbeckham travisbeckham requested a review from kflynn July 15, 2025 15:16
Comment on lines +26 to +31
Linkerd automatically rotates workload certificates, but it does **not**
rotate the identity issuer certificate or the trust anchor. You can use
third-party tools like cert-manager to automate rotation of those
certificates. However, for critical certificates—such as the
trust anchor, you must manually restart the control-plane components
and all data-plane proxies so they pick up the new trust anchor.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Linkerd automatically rotates workload certificates, but it does **not**
rotate the identity issuer certificate or the trust anchor. You can use
third-party tools like cert-manager to automate rotation of those
certificates. However, for critical certificates—such as the
trust anchor, you must manually restart the control-plane components
and all data-plane proxies so they pick up the new trust anchor.
Linkerd automatically rotates workload certificates, but it **cannot**
automatically rotate the identity issuer certificate or the trust anchor.
Third-party tools like cert-manager can automate rotation of those
certificates for you, but **read this documentation carefully** to understand
when you need to restart Linkerd components in order to pick up the new
certificates.


{{< warning >}}

This task is criticalas it ensures the old trust anchor remains valid alongside
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This task is criticalas it ensures the old trust anchor remains valid alongside
This task is critical, since it ensures the old trust anchor remains valid alongside

Copy link
Member

@kflynn kflynn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! and sorry for the delay. I've suggested a couple of tweaks, let me know what you think! 🙂

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants