Manage expiration of kubeconfig client certificates

Summary

We lack an automated refresh of the client certificates of Sylva kubeconfig files

Details

It appears that at some point, the sylva kubeconfig files does not work any more

~/my-deployment/sylva-core$ k get nodes -A --kubeconfig management-cluster-kubeconfig
E0505 10:07:57.473322    1836 memcache.go:265] couldn't get current server API group list: the server has asked for the client to provide credentials
E0505 10:07:57.478448    1836 memcache.go:265] couldn't get current server API group list: the server has asked for the client to provide credentials
E0505 10:07:57.483944    1836 memcache.go:265] couldn't get current server API group list: the server has asked for the client to provide credentials
E0505 10:07:57.490368    1836 memcache.go:265] couldn't get current server API group list: the server has asked for the client to provide credentials
E0505 10:07:57.495616    1836 memcache.go:265] couldn't get current server API group list: the server has asked for the client to provide credentials
error: You must be logged in to the server (the server has asked for the client to provide credentials)

For both kubeadm and RKE2, the client certificates expires after 1 year, so it will occur on all long-lived platforms.

A possible implementation could be to have apply.sh and apply-workload-cluster.sh to refresh the certificates when needed.

Assignee Loading
Time tracking Loading