-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate and document correlation between Rancher cacerts and server-url settings #1604
Comments
Trying to successfully bring up a private CA Rancher environment, but hardcoding the |
After playing with private CA setup and switching CAs, I have a few questions still to answer:
|
Good news, the TLS enforcement mode can be configured on agents: https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-references/tls-settings#agent-tls-enforcement |
Spike is done, closing as a new set of issues was created as result: #1612 |
The behavior of
server-url
andcacerts
need better documentation to inform the user how Elemental uses these settings.These settings are used for the
elemental-register
, andelemental-system-agent
(andrancher-system-agent
?) configs.While the
elemental-register
can cope with a mismatchingcacerts
value, theelemental-system-agent
is going to fail if thecacerts
is not matching theserver-url
's certificate.This is because the
server-url
is used to create the kubeconfig used by theelemental-system-agent
, and by default we use thecacerts
value to populate thecertificate-authority-data
in the config.If I understand this correctly, the kubeconfig strictly uses the
certificate-authority-data
value to validate the k8s API. So this has a large impact when theserver-url
is pointing to a secondary ingress for example.I think this is the relevant doc: https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/resources/update-rancher-certificate
Also relevant, the
tls-rancher-ingress
CA can be easily checked onhttps://my.rancher.domain/cacerts
The text was updated successfully, but these errors were encountered: