Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue with k8s.io/docs/admin/authentication/ #5362

Closed
1 of 2 tasks
ghost opened this issue Sep 9, 2017 · 6 comments
Closed
1 of 2 tasks

Issue with k8s.io/docs/admin/authentication/ #5362

ghost opened this issue Sep 9, 2017 · 6 comments
Assignees

Comments

@ghost
Copy link

ghost commented Sep 9, 2017

This is a...

  • Feature Request
  • Bug Report

Problem:
generating certificates with openssl is missing the required IP SANs
dashboard is not happy without...
Error while initializing connection to Kubernetes apiserver. This most likely means that the cluster is misconfigured (e.g., it has invalid apiserver certificates or service accounts configuration) or the --apiserver-host param points to a server that does not exist. Reason: Get https://10.254.0.1:443/version: x509: cannot validate certificate for 10.254.0.1 because it doesn't contain any IP SANs
(/etc/kubernetes/apiserver:KUBE_SERVICE_ADDRESSES="--service-cluster-ip-range=10.254.0.0/16")

Proposed Solution:
still investigating but subjectAltName openssl option seems the solution

Page to Update:
http://kubernetes.io/...

@zacharysarah
Copy link
Contributor

@ahmetb 👋

@ahmetb
Copy link
Member

ahmetb commented Sep 30, 2017

I've got no clue. ¯\_(ツ)_/¯. It might be good to ask this on kubernetes-users@ mailing list or the Slack channel first to confirm what the issue is.

/unassign

@tengqm
Copy link
Contributor

tengqm commented Oct 1, 2017

yes. There seem to be two problems. OpenSSL by default generates v1 certificates, which seems not supporting SAN well. Even when switching to v3 certificate, you will have to include the service cluster IP of the API server into the certificate.

@ghost
Copy link
Author

ghost commented Oct 1, 2017

because it doesn't contain any IP SANs thats the issue if one follow the documentation because openssl req -new -key server.key -subj "/CN=${MASTER_IP}" -out server.csr does not include the required subjectAltName

so either delete the openssl part from the documentation or add a sentence the api server certificate MUST have a subjectAltName and include the FQDN's and IP's

@zacharysarah
Copy link
Contributor

@cyberh0me 👋

so either delete the openssl part from the documentation or add a sentence the api server certificate MUST have a subjectAltName and include the FQDN's and IP's

Thanks for the update. I'll flag this issue as Actionable for doc updates.

@tengqm
Copy link
Contributor

tengqm commented Oct 19, 2017

/assign

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants