Updating TLS Certificates in Embedded kURL Clusters
This topic describes how to upload custom TLS certificates for embedded clusters created with Replicated kURL.
Overview
For embedded clusters created with kURL, the default Replicated KOTS self-signed certificate automatically renews 30 days before the expiration date.
If you have uploaded a custom TLS certificate instead, then no renewal is attempted, even if the certificate is expired. In this case, you must manually upload a new custom certificate.
For information about TLS renewal for registry and Kubernetes control plane with Replicated kURL, see TLS Certificates in the kURL documentation.
Update Custom TLS Certificates
If you are using a custom TLS certificate in an embedded kURL cluster, you manually upload a new certificate when the previous one expires.
Adding the acceptAnonymousUploads
annotation temporarily creates a vulnerability for an attacker to maliciously upload TLS certificates. After TLS certificates have been uploaded, the vulnerability is closed again.
Replicated recommends that you complete this upload process quickly to minimize the vulnerability risk.
To upload a new custom TLS certificate:
-
Run the following annotation command to restore the ability to upload new TLS certificates:
kubectl -n default annotate secret kotsadm-tls acceptAnonymousUploads=1 --overwrite
-
Run the following command to get the name of the kurl-proxy server:
kubectl get pods -A | grep kurl-proxy | awk '{print $2}'
-
Run the following command to delete the kurl-proxy pod. The pod automatically restarts after the command runs.
kubectl delete pods PROXY_SERVER
Replace PROXY_SERVER with the name of the kurl-proxy server that you got in the previous step.
-
After the pod has restarted, direct your browser to
http://<ip>:8800/tls
and go through the upload process in the user interface.