Skip to content

Clarification about Custom CA certificates #8291

Answered by brandond
sushiMix asked this question in Q&A
Discussion options

You must be logged in to vote

Yeah, the health-check listener certs for the controller-manager, scheduler, and so on are just generated in-memory by the Kubernetes components themselves, and are not persisted to disk anywhere. That is, as far as I know, common behavior across most Kubernetes distros. You can see this occurring in the startup logs:

Sep 07 20:35:56 systemd-node-1 k3s[292]: I0907 20:35:56.781652     292 serving.go:355] Generated self-signed cert in-memory
Sep 07 20:35:59 systemd-node-1 k3s[292]: I0907 20:35:59.866262     292 serving.go:355] Generated self-signed cert in-memory
Sep 07 20:36:00 systemd-node-1 k3s[292]: I0907 20:36:00.056729     292 serving.go:355] Generated self-signed cert in-memory
Sep 0…

Replies: 1 comment 5 replies

Comment options

You must be logged in to vote
5 replies
@sushiMix
Comment options

@brandond
Comment options

@sushiMix
Comment options

@brandond
Comment options

Answer selected by sushiMix
@sushiMix
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants