(1)、查看当前的证书时间
# kubeadm alpha certs check-expiration[check-expiration] Reading configuration from the cluster...[check-expiration] FYI: You can look at this config file with 'kubectl -n kube-system get cm kubeadm-config -oyaml'CERTIFICATE EXPIRES RESIDUAL TIME CERTIFICATE AUTHORITY EXTERNALLY MANAGEDadmin.conf Jun 20, 2021 11:21 UTC 364d noapiserver Jun 20, 2021 11:21 UTC 364d ca noapiserver-etcd-client Jun 20, 2021 11:21 UTC 364d etcd-ca noapiserver-kubelet-client Jun 20, 2021 11:21 UTC 364d ca nocontroller-manager.conf Jun 20, 2021 11:21 UTC 364d noetcd-healthcheck-client Jun 20, 2021 11:21 UTC 364d etcd-ca noetcd-peer Jun 20, 2021 11:21 UTC 364d etcd-ca noetcd-server Jun 20, 2021 11:21 UTC 364d etcd-ca nofront-proxy-client Jun 20, 2021 11:21 UTC 364d front-proxy-ca noscheduler.conf Jun 20, 2021 11:21 UTC 364d noCERTIFICATE AUTHORITY EXPIRES RESIDUAL TIME EXTERNALLY MANAGEDca Jun 18, 2030 11:21 UTC 9y noetcd-ca Jun 18, 2030 11:21 UTC 9y nofront-proxy-ca Jun 18, 2030 11:21 UTC 9y no
(2)、下载源码
git clone https://github.com/kubernetes/kubernetes.git
(3)、切换到自己的版本,修改源码,比如我的是v1.17.2版本
cd kubernetesgit checkout v1.17.2
vim cmd/kubeadm/app/constants/constants.go,找到CertificateValidity,修改如下
....const (// KubernetesDir is the directory Kubernetes owns for storing various configuration filesKubernetesDir = "/etc/kubernetes"// ManifestsSubDirName defines directory name to store manifestsManifestsSubDirName = "manifests"// TempDirForKubeadm defines temporary directory for kubeadm// should be joined with KubernetesDir.TempDirForKubeadm = "tmp"// CertificateValidity defines the validity for all the signed certificates generated by kubeadmCertificateValidity = time.Hour * 24 * 365 * 100....
(4)、编译kubeadm
make WHAT=cmd/kubeadm
编译完生成如下目录和二进制文件
# ll _output/bin/total 76172-rwxr-xr-x 1 root root 6799360 Jun 20 21:08 conversion-gen-rwxr-xr-x 1 root root 6778880 Jun 20 21:08 deepcopy-gen-rwxr-xr-x 1 root root 6750208 Jun 20 21:08 defaulter-gen-rwxr-xr-x 1 root root 4883629 Jun 20 21:08 go2make-rwxr-xr-x 1 root root 2109440 Jun 20 21:09 go-bindata-rwxr-xr-x 1 root root 39256064 Jun 20 21:11 kubeadm-rwxr-xr-x 1 root root 11419648 Jun 20 21:09 openapi-gen
(5)、备份原kubeadm和证书文件
cp /usr/bin/kubeadm{,.bak20200620}cp -r /etc/kubernetes/pki{,.bak20200620}
(7)、将新生成的kubeadm进行替换
cp _output/bin/kubeadm /usr/bin/kubeadm
(8)、生成新的证书
cd /etc/kubernetes/pkikubeadm alpha certs renew all
输出如下
[renew] FYI: You can look at this config file with 'kubectl -n kube-system get cm kubeadm-config -oyaml'certificate embedded in the kubeconfig file for the admin to use and for kubeadm itself renewedcertificate for serving the Kubernetes API renewedcertificate the apiserver uses to access etcd renewedcertificate for the API server to connect to kubelet renewedcertificate embedded in the kubeconfig file for the controller manager to use renewedcertificate for liveness probes to healthcheck etcd renewedcertificate for etcd nodes to communicate with each other renewedcertificate for serving etcd renewedcertificate for the front proxy client renewedcertificate embedded in the kubeconfig file for the scheduler manager to use renewed
(9)、验证结果
kubeadm alpha certs check-expiration
输出如下
[root@k8s-master pki]# kubeadm alpha certs check-expiration[check-expiration] Reading configuration from the cluster...[check-expiration] FYI: You can look at this config file with 'kubectl -n kube-system get cm kubeadm-config -oyaml'CERTIFICATE EXPIRES RESIDUAL TIME CERTIFICATE AUTHORITY EXTERNALLY MANAGEDadmin.conf May 27, 2120 13:25 UTC 99y noapiserver May 27, 2120 13:25 UTC 99y ca noapiserver-etcd-client May 27, 2120 13:25 UTC 99y etcd-ca noapiserver-kubelet-client May 27, 2120 13:25 UTC 99y ca nocontroller-manager.conf May 27, 2120 13:25 UTC 99y noetcd-healthcheck-client May 27, 2120 13:25 UTC 99y etcd-ca noetcd-peer May 27, 2120 13:25 UTC 99y etcd-ca noetcd-server May 27, 2120 13:25 UTC 99y etcd-ca nofront-proxy-client May 27, 2120 13:25 UTC 99y front-proxy-ca noscheduler.conf May 27, 2120 13:25 UTC 99y noCERTIFICATE AUTHORITY EXPIRES RESIDUAL TIME EXTERNALLY MANAGEDca Jun 18, 2030 11:21 UTC 9y noetcd-ca Jun 18, 2030 11:21 UTC 9y nofront-proxy-ca Jun 18, 2030 11:21 UTC 9y no
查看集群状态是否OK。
[root@k8s-master pki]# kubectl get nodeNAME STATUS ROLES AGE VERSIONk8s-master Ready master 127m v1.17.2k8s-node01 Ready <none> 94m v1.17.2k8s-node02 Ready <none> 95m v1.17.2[root@k8s-master pki]# kubectl get pod -n kube-systemNAME READY STATUS RESTARTS AGEcalico-kube-controllers-589b5f594b-76vwr 1/1 Running 0 93mcalico-node-4qvfj 1/1 Running 0 93mcalico-node-cn79s 1/1 Running 0 93mcalico-node-sppn9 1/1 Running 0 93mcoredns-7f9c544f75-hc5q5 1/1 Running 0 127mcoredns-7f9c544f75-z77s8 1/1 Running 0 127metcd-k8s-master 1/1 Running 0 114mkube-apiserver-k8s-master 1/1 Running 0 115mkube-controller-manager-k8s-master 1/1 Running 0 114mkube-proxy-6kckk 1/1 Running 0 94mkube-proxy-r7mn2 1/1 Running 0 127mkube-proxy-zf48c 1/1 Running 0 95mkube-scheduler-k8s-master 1/1 Running 0 114m
更新kubeconfig
kubeadm init phase kubeconfig all --config kubeadm.yaml[kubeconfig] Using kubeconfig folder "/etc/kubernetes"[kubeconfig] Using existing kubeconfig file: "/etc/kubernetes/admin.conf"[kubeconfig] Using existing kubeconfig file: "/etc/kubernetes/kubelet.conf"[kubeconfig] Using existing kubeconfig file: "/etc/kubernetes/controller-manager.conf"[kubeconfig] Using existing kubeconfig file: "/etc/kubernetes/scheduler.conf"
将新生成的 admin 配置文件覆盖掉原本的 admin 文件:
mv $HOME/.kube/config $HOME/.kube/config.oldcp -i /etc/kubernetes/admin.conf $HOME/.kube/configchown $(id -u):$(id -g) $HOME/.kube/config
完成后重启 kube-apiserver、kube-controller、kube-scheduler、etcd 这4个容器即可,我们可以查看 apiserver 的证书的有效期来验证是否更新成功:
$ echo | openssl s_client -showcerts -connect 127.0.0.1:6443 -servername api 2>/dev/null | openssl x509 -noout -enddatenotAfter=Aug 26 03:47:23 2021 GMT
到此证书修改完成。
如果github上下载很慢的话可以到gitee上下载,地址:https://gitee.com/mirrors/Kubernetes/tree/master/
不过证书修改虽然完成了,但是kubelet的证书并没有更新,这时候我们可以开启证书自动轮转。
(1)增加 kubelet 参数
修改/usr/lib/systemd/system/kubelet.service
--feature-gates=RotateKubeletServerCertificate=true
(2)增加 controller-manager 参数
修改controller-manager的yaml文件
--experimental-cluster-signing-duration=87600h0m0s--feature-gates=RotateKubeletServerCertificate=true
(3)创建 rbac 对象
创建rbac对象,允许节点轮换kubelet server证书:
apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRolemetadata:annotations:rbac.authorization.kubernetes.io/autoupdate: "true"labels:kubernetes.io/bootstrapping: rbac-defaultsname: system:certificates.k8s.io:certificatesigningrequests:selfnodeserverrules:- apiGroups:- certificates.k8s.ioresources:- certificatesigningrequests/selfnodeserververbs:- create---apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRoleBindingmetadata:name: kubeadm:node-autoapprove-certificate-serverroleRef:apiGroup: rbac.authorization.k8s.iokind: ClusterRolename: system:certificates.k8s.io:certificatesigningrequests:selfnodeserversubjects:- apiGroup: rbac.authorization.k8s.iokind: Groupname: system:nodes
查看证书时间
openssl x509 -in ca.crt -noout -text | grep "Not"
